General

  • Target

    25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391

  • Size

    1.1MB

  • Sample

    221020-ld13ysfef6

  • MD5

    816cc4d38afcf2792be067bb64637ed9

  • SHA1

    9d87f8340eec6469c9bdc25a6cac29e6cb5add93

  • SHA256

    25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391

  • SHA512

    5bb37ec318842ab1705bf7c46b66aaed60e5443da1ab50ad48cf328cd7f45793598a8f964c7930bc64e4fbc8fa698a9fcc0018ad81637555da8fa0b0dd7b63e3

  • SSDEEP

    24576:GV+yqaLs4zzaWWc5cxAN+ENr6XovJIYKC19:YZLjphccM4vJvjP

Malware Config

Targets

    • Target

      25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391

    • Size

      1.1MB

    • MD5

      816cc4d38afcf2792be067bb64637ed9

    • SHA1

      9d87f8340eec6469c9bdc25a6cac29e6cb5add93

    • SHA256

      25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391

    • SHA512

      5bb37ec318842ab1705bf7c46b66aaed60e5443da1ab50ad48cf328cd7f45793598a8f964c7930bc64e4fbc8fa698a9fcc0018ad81637555da8fa0b0dd7b63e3

    • SSDEEP

      24576:GV+yqaLs4zzaWWc5cxAN+ENr6XovJIYKC19:YZLjphccM4vJvjP

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks