General

  • Target

    92aab46d0e0b52f33f241a548d95758ecd23a78024626a6b5c190000d172dda0

  • Size

    673KB

  • Sample

    221106-mhjj5sfee7

  • MD5

    20ef16a722778d92f6bf93d3310eb9ea

  • SHA1

    3b6c0364751e892749c77e40b2ec75c8a71e3f48

  • SHA256

    92aab46d0e0b52f33f241a548d95758ecd23a78024626a6b5c190000d172dda0

  • SHA512

    9d596b365c4fbfbbeb75fb643322ef392bab666a106aa349692a15c5d85a94e67a0d6ed09035ac2b3cf779aa82e653efbebc8311f766816297e349d58e059a7e

  • SSDEEP

    6144:8dhylx6z9cdIKCC0ef//uXltKc+LVsz9b86dhyeK62/rZAlPbLxYMbUyPnQ/txC+:s62cdFeCXuLKcCVsz6OtU/WPpYDxAO

Malware Config

Targets

    • Target

      92aab46d0e0b52f33f241a548d95758ecd23a78024626a6b5c190000d172dda0

    • Size

      673KB

    • MD5

      20ef16a722778d92f6bf93d3310eb9ea

    • SHA1

      3b6c0364751e892749c77e40b2ec75c8a71e3f48

    • SHA256

      92aab46d0e0b52f33f241a548d95758ecd23a78024626a6b5c190000d172dda0

    • SHA512

      9d596b365c4fbfbbeb75fb643322ef392bab666a106aa349692a15c5d85a94e67a0d6ed09035ac2b3cf779aa82e653efbebc8311f766816297e349d58e059a7e

    • SSDEEP

      6144:8dhylx6z9cdIKCC0ef//uXltKc+LVsz9b86dhyeK62/rZAlPbLxYMbUyPnQ/txC+:s62cdFeCXuLKcCVsz6OtU/WPpYDxAO

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks