General

  • Target

    69d673de76e185889cec1767635953f3c11cfe87479485c99e8c4c6105faf823

  • Size

    280KB

  • Sample

    221030-p3neyaccdn

  • MD5

    93efd20e49f88045b85f88910ebba437

  • SHA1

    3f60ee0982c951d2ebc56b5d5d999edba60585b3

  • SHA256

    69d673de76e185889cec1767635953f3c11cfe87479485c99e8c4c6105faf823

  • SHA512

    0bf9193715260457ea94f6191802db00fed371402fd20c054a98b02afa72ef814bc0908a731c0777d0ded3b05743e9f7204f389621023745cdd581e8ce97cd3d

  • SSDEEP

    6144:LtyZPrwe7oZzR9my/pdMgS6pAGwpCWvQ+YnC3H/LkySe+37:RBzKy/pdM4pS0Wv9YnC3fLkBeu

Malware Config

Targets

    • Target

      69d673de76e185889cec1767635953f3c11cfe87479485c99e8c4c6105faf823

    • Size

      280KB

    • MD5

      93efd20e49f88045b85f88910ebba437

    • SHA1

      3f60ee0982c951d2ebc56b5d5d999edba60585b3

    • SHA256

      69d673de76e185889cec1767635953f3c11cfe87479485c99e8c4c6105faf823

    • SHA512

      0bf9193715260457ea94f6191802db00fed371402fd20c054a98b02afa72ef814bc0908a731c0777d0ded3b05743e9f7204f389621023745cdd581e8ce97cd3d

    • SSDEEP

      6144:LtyZPrwe7oZzR9my/pdMgS6pAGwpCWvQ+YnC3H/LkySe+37:RBzKy/pdM4pS0Wv9YnC3fLkBeu

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks