General

  • Target

    4a764259016f2f94d5ac816ced803fd1c35bcda6ebc50e2b2b030d767813fc4e

  • Size

    268KB

  • Sample

    221021-ts6wraeehj

  • MD5

    47dff67b61ade1b6905d2a11c176ee70

  • SHA1

    41b3a83e6cd715e61e343a0fda9258cc474bdf00

  • SHA256

    4a764259016f2f94d5ac816ced803fd1c35bcda6ebc50e2b2b030d767813fc4e

  • SHA512

    4108206309796fcc50ad10ae72e5706c2add69c717192cc2174d95880ebc4d7773cb40c32403ff227837434df76ad08e15bd149bda239c6f95bf155dfe30f9c7

  • SSDEEP

    6144:bYb//1PxwpdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:xpdFeCXuLKcCVsz6SDLXo

Malware Config

Targets

    • Target

      4a764259016f2f94d5ac816ced803fd1c35bcda6ebc50e2b2b030d767813fc4e

    • Size

      268KB

    • MD5

      47dff67b61ade1b6905d2a11c176ee70

    • SHA1

      41b3a83e6cd715e61e343a0fda9258cc474bdf00

    • SHA256

      4a764259016f2f94d5ac816ced803fd1c35bcda6ebc50e2b2b030d767813fc4e

    • SHA512

      4108206309796fcc50ad10ae72e5706c2add69c717192cc2174d95880ebc4d7773cb40c32403ff227837434df76ad08e15bd149bda239c6f95bf155dfe30f9c7

    • SSDEEP

      6144:bYb//1PxwpdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:xpdFeCXuLKcCVsz6SDLXo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks