General

  • Target

    f1f5a8399efdf4dd727b63369c5342604c257b591cd5683b33be1ad2f88132a6

  • Size

    304KB

  • Sample

    221028-2jby1sabc7

  • MD5

    70593ba12aadb972c6b6b2b024c5158c

  • SHA1

    2d3e5c9cd1d90062d007394903e2448751eb38ba

  • SHA256

    f1f5a8399efdf4dd727b63369c5342604c257b591cd5683b33be1ad2f88132a6

  • SHA512

    4966300f7ef8183a7ed2e293c559c4e6feba29de5bf8b73265a1a9f29440db99c8b33250af33098673bee47a9b9e3a3eb88efe27c883233c93701287fbe759fb

  • SSDEEP

    6144:QYhfXzkpnfP89l3hz88HSvYYI6KYM7HRw6wCsQytN6LbC2N:QYponfU7BP+YYJKbK1BcLbZN

Malware Config

Targets

    • Target

      f1f5a8399efdf4dd727b63369c5342604c257b591cd5683b33be1ad2f88132a6

    • Size

      304KB

    • MD5

      70593ba12aadb972c6b6b2b024c5158c

    • SHA1

      2d3e5c9cd1d90062d007394903e2448751eb38ba

    • SHA256

      f1f5a8399efdf4dd727b63369c5342604c257b591cd5683b33be1ad2f88132a6

    • SHA512

      4966300f7ef8183a7ed2e293c559c4e6feba29de5bf8b73265a1a9f29440db99c8b33250af33098673bee47a9b9e3a3eb88efe27c883233c93701287fbe759fb

    • SSDEEP

      6144:QYhfXzkpnfP89l3hz88HSvYYI6KYM7HRw6wCsQytN6LbC2N:QYponfU7BP+YYJKbK1BcLbZN

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks