General

  • Target

    1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a

  • Size

    474KB

  • Sample

    221021-j6saeabadm

  • MD5

    591d4b220d8e425034be1aa8d66e5230

  • SHA1

    12d004a920d037314444e946e3fed0d9f7f80f01

  • SHA256

    1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a

  • SHA512

    1335a34753ddfc03cc7dee80e336668f9f7ffe53c6336f1b43e7b45c48966847ba625297b981cb8731f8600f265f1921102b4be6dec3e3dbd27e0071f368bc16

  • SSDEEP

    12288:mfx/RiZaBvxLEdUumMRVtbnW9CO8m/wre:mfhMQ54dtmMRVtbWz/7

Malware Config

Targets

    • Target

      1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a

    • Size

      474KB

    • MD5

      591d4b220d8e425034be1aa8d66e5230

    • SHA1

      12d004a920d037314444e946e3fed0d9f7f80f01

    • SHA256

      1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a

    • SHA512

      1335a34753ddfc03cc7dee80e336668f9f7ffe53c6336f1b43e7b45c48966847ba625297b981cb8731f8600f265f1921102b4be6dec3e3dbd27e0071f368bc16

    • SSDEEP

      12288:mfx/RiZaBvxLEdUumMRVtbnW9CO8m/wre:mfhMQ54dtmMRVtbWz/7

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks