General

  • Target

    482324cd99084ad055a2f3d7b7f6126939482ecfdeb9f9f53c657148b7f4b23b

  • Size

    173KB

  • Sample

    221029-t1h5nafaep

  • MD5

    838c7f66c15a84419510d9642f46ab41

  • SHA1

    094b7c7d3b45af32fa227adcc074cf250b85f4bd

  • SHA256

    482324cd99084ad055a2f3d7b7f6126939482ecfdeb9f9f53c657148b7f4b23b

  • SHA512

    d80620e812277adeba5f1075fad701e0f299bfcca79f787cb2e595e6964e9d44aafc291ed6c9fc2961d0136820a3b9f05176db86bcd30dc551057f4fdf93cc38

  • SSDEEP

    3072:uVzKxDfE3Oh9EdLQAQnOLx5X7pl3MDVZdx8udG0206hojLldWafruJgHPQkout:dSuCLdQOdgZdWup206KvldvruSVoS

Malware Config

Targets

    • Target

      482324cd99084ad055a2f3d7b7f6126939482ecfdeb9f9f53c657148b7f4b23b

    • Size

      173KB

    • MD5

      838c7f66c15a84419510d9642f46ab41

    • SHA1

      094b7c7d3b45af32fa227adcc074cf250b85f4bd

    • SHA256

      482324cd99084ad055a2f3d7b7f6126939482ecfdeb9f9f53c657148b7f4b23b

    • SHA512

      d80620e812277adeba5f1075fad701e0f299bfcca79f787cb2e595e6964e9d44aafc291ed6c9fc2961d0136820a3b9f05176db86bcd30dc551057f4fdf93cc38

    • SSDEEP

      3072:uVzKxDfE3Oh9EdLQAQnOLx5X7pl3MDVZdx8udG0206hojLldWafruJgHPQkout:dSuCLdQOdgZdWup206KvldvruSVoS

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks