General

  • Target

    38858d6aa81ba13cf9d931bd3cd4cbe02f5bf0da69fffb9718df92367ec215aa

  • Size

    323KB

  • Sample

    221106-s2vdmsbfgr

  • MD5

    05935a31c91ca069cc81905baa44c120

  • SHA1

    486bc61e79aaae877730060e45454ef2fe402ad4

  • SHA256

    38858d6aa81ba13cf9d931bd3cd4cbe02f5bf0da69fffb9718df92367ec215aa

  • SHA512

    b8b96ca1824f2a5a8c5f3f62d80bf61144729c2be741500bd116bd40ac6494b51d9573ff60a9e9b26a1ce44fe1dbda07fa075c4b45c904946b5e81a35268ae62

  • SSDEEP

    6144:NBiSFhKj/eCmZr6pjVZGr0vo70ZOJ6OtxDBk1hS0kZisYw0CiD:NBiSCZ0r6p5ZGrIOJl2wZisx0CiD

Malware Config

Targets

    • Target

      38858d6aa81ba13cf9d931bd3cd4cbe02f5bf0da69fffb9718df92367ec215aa

    • Size

      323KB

    • MD5

      05935a31c91ca069cc81905baa44c120

    • SHA1

      486bc61e79aaae877730060e45454ef2fe402ad4

    • SHA256

      38858d6aa81ba13cf9d931bd3cd4cbe02f5bf0da69fffb9718df92367ec215aa

    • SHA512

      b8b96ca1824f2a5a8c5f3f62d80bf61144729c2be741500bd116bd40ac6494b51d9573ff60a9e9b26a1ce44fe1dbda07fa075c4b45c904946b5e81a35268ae62

    • SSDEEP

      6144:NBiSFhKj/eCmZr6pjVZGr0vo70ZOJ6OtxDBk1hS0kZisYw0CiD:NBiSCZ0r6p5ZGrIOJl2wZisx0CiD

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks