General

  • Target

    aaf73a75ab5d1e2532f0a450681b30a517ef7615e6b8c99a4c472db21e56b0ad

  • Size

    647KB

  • Sample

    221106-jnvb2sdaej

  • MD5

    127019d89fc4b4e83c0d2b757b8a4e70

  • SHA1

    0115e3e2de4776861fe220ae6bd2a67efaad2ab8

  • SHA256

    aaf73a75ab5d1e2532f0a450681b30a517ef7615e6b8c99a4c472db21e56b0ad

  • SHA512

    dc941c2aede3202c85776e18149dacf07948bdea9601ce40fd037aab946643e60243e9fdb0b0f086f50889d4d4adfb69776a58bcea14589880b3eebc7fd85388

  • SSDEEP

    12288:uwdrj3aLlVPKvzLm74ATZnFNVtnCVTJbMEdwDbLCXjkZXEBW:zH3uKL3AVFNjnomEdULqjKXE

Malware Config

Targets

    • Target

      aaf73a75ab5d1e2532f0a450681b30a517ef7615e6b8c99a4c472db21e56b0ad

    • Size

      647KB

    • MD5

      127019d89fc4b4e83c0d2b757b8a4e70

    • SHA1

      0115e3e2de4776861fe220ae6bd2a67efaad2ab8

    • SHA256

      aaf73a75ab5d1e2532f0a450681b30a517ef7615e6b8c99a4c472db21e56b0ad

    • SHA512

      dc941c2aede3202c85776e18149dacf07948bdea9601ce40fd037aab946643e60243e9fdb0b0f086f50889d4d4adfb69776a58bcea14589880b3eebc7fd85388

    • SSDEEP

      12288:uwdrj3aLlVPKvzLm74ATZnFNVtnCVTJbMEdwDbLCXjkZXEBW:zH3uKL3AVFNjnomEdULqjKXE

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks