General

  • Target

    ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88

  • Size

    2.0MB

  • Sample

    221029-s2l29scfb9

  • MD5

    8fb2caac8887a8538ca73db1c29d82e4

  • SHA1

    f5e346a81a009cee885fbb49a195b1963e820da4

  • SHA256

    ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88

  • SHA512

    d44cc65ddea17316de8c84e8c90bb6024c66b8f1b3646ae3ec1c68ef5cecf7c4a5210a3a99676e36d3b799d0ec0659f949b3ad01667ecc058897f3a10c2f42c7

  • SSDEEP

    49152:FSVaOWFkkkE5Xmw3tZwiopdKIEilfUya2iuFXmUT:FS8bkbEXvjyK18darulm2

Malware Config

Targets

    • Target

      ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88

    • Size

      2.0MB

    • MD5

      8fb2caac8887a8538ca73db1c29d82e4

    • SHA1

      f5e346a81a009cee885fbb49a195b1963e820da4

    • SHA256

      ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88

    • SHA512

      d44cc65ddea17316de8c84e8c90bb6024c66b8f1b3646ae3ec1c68ef5cecf7c4a5210a3a99676e36d3b799d0ec0659f949b3ad01667ecc058897f3a10c2f42c7

    • SSDEEP

      49152:FSVaOWFkkkE5Xmw3tZwiopdKIEilfUya2iuFXmUT:FS8bkbEXvjyK18darulm2

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks