General

  • Target

    dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735

  • Size

    505KB

  • Sample

    221020-x4f19abcar

  • MD5

    901fd8a7416fd67667a3863072647250

  • SHA1

    9e47b37b96d3b540e45f1360794bc5334798815c

  • SHA256

    dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735

  • SHA512

    0952772b4941f3e6251bf91672add77628d9ffd13f2954efb78ff273811ed962c3f912aab40b55d2be848b4b4655e1d3a1cdbeefdcc0c5195ac098714c99828a

  • SSDEEP

    6144:H4h88HmXLnFUrudpWWYk3OmsvRebR/YCMwG0d1oRhPaz/twt3y0FS:Yh88HmpMudpXYWOnw/YdV0jojvU

Malware Config

Targets

    • Target

      dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735

    • Size

      505KB

    • MD5

      901fd8a7416fd67667a3863072647250

    • SHA1

      9e47b37b96d3b540e45f1360794bc5334798815c

    • SHA256

      dea3e5fa45e2b709e240b450e00eadd80dcd624f88b8dd45cb3220978e487735

    • SHA512

      0952772b4941f3e6251bf91672add77628d9ffd13f2954efb78ff273811ed962c3f912aab40b55d2be848b4b4655e1d3a1cdbeefdcc0c5195ac098714c99828a

    • SSDEEP

      6144:H4h88HmXLnFUrudpWWYk3OmsvRebR/YCMwG0d1oRhPaz/twt3y0FS:Yh88HmpMudpXYWOnw/YdV0jojvU

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks