General

  • Target

    213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d

  • Size

    366KB

  • Sample

    221106-lha3bsdgf4

  • MD5

    1156c47a63e8ac62828e29bd20e6f180

  • SHA1

    5e980f9a800a87ea77810605015e062c0fbbcae4

  • SHA256

    213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d

  • SHA512

    879a1577c5da1f14060c4f60e57894e8480187ef2d324d613d99c095a84fe91e14079fe5fb3bc36b0d7f223ce7564b4ee7b9c02ae39f076ac81b171567cb3752

  • SSDEEP

    6144:wzlCREOuG5oTWqCPrNeBbVqtDgkmRpf341qMgMbyALQWB3gjrJHPYIwqCo8Le:yoxuZyqCjNeBbMVg1RpfIvg5ALJ3IHPr

Malware Config

Targets

    • Target

      213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d

    • Size

      366KB

    • MD5

      1156c47a63e8ac62828e29bd20e6f180

    • SHA1

      5e980f9a800a87ea77810605015e062c0fbbcae4

    • SHA256

      213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d

    • SHA512

      879a1577c5da1f14060c4f60e57894e8480187ef2d324d613d99c095a84fe91e14079fe5fb3bc36b0d7f223ce7564b4ee7b9c02ae39f076ac81b171567cb3752

    • SSDEEP

      6144:wzlCREOuG5oTWqCPrNeBbVqtDgkmRpf341qMgMbyALQWB3gjrJHPYIwqCo8Le:yoxuZyqCjNeBbMVg1RpfIvg5ALJ3IHPr

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks