General

  • Target

    9d988c7fc830d3ecc91e22d62c6fe585bdcf6e42d61f1e70117022e9c2bc4bc6

  • Size

    385KB

  • Sample

    221029-amsx6adger

  • MD5

    d7137a7a1b7fedf4304883f06f95c80b

  • SHA1

    963fe4d98c7ec63fca75aa2e0c89c170ad130166

  • SHA256

    9d988c7fc830d3ecc91e22d62c6fe585bdcf6e42d61f1e70117022e9c2bc4bc6

  • SHA512

    df79c0eb4ffdd444237bb0bd9568c4c8741ad1540eb5f72067cbbc46aaf69617c66a52c956397dba4f4c8915f722ed9a1e78cc9099e19f2992672808395c7428

  • SSDEEP

    6144:Cex5IgRXD+t9aU+23hz+hPSrhMu+sUE+nZynycpqvhde/bpqrz6O+U1UJPHmViI:x5IqSbax2xWS+Zytqvh8/dqrOdU1yO

Malware Config

Targets

    • Target

      9d988c7fc830d3ecc91e22d62c6fe585bdcf6e42d61f1e70117022e9c2bc4bc6

    • Size

      385KB

    • MD5

      d7137a7a1b7fedf4304883f06f95c80b

    • SHA1

      963fe4d98c7ec63fca75aa2e0c89c170ad130166

    • SHA256

      9d988c7fc830d3ecc91e22d62c6fe585bdcf6e42d61f1e70117022e9c2bc4bc6

    • SHA512

      df79c0eb4ffdd444237bb0bd9568c4c8741ad1540eb5f72067cbbc46aaf69617c66a52c956397dba4f4c8915f722ed9a1e78cc9099e19f2992672808395c7428

    • SSDEEP

      6144:Cex5IgRXD+t9aU+23hz+hPSrhMu+sUE+nZynycpqvhde/bpqrz6O+U1UJPHmViI:x5IqSbax2xWS+Zytqvh8/dqrOdU1yO

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks