General

  • Target

    520b8753ec07046c66e9df38fa53b95ffc442fca005b7b0daa30a289dc146b3b

  • Size

    448KB

  • Sample

    221119-kmbzrace65

  • MD5

    526eae80ceb653f775d43213bfe6eb30

  • SHA1

    b5d0e5514c8df40312ad708dac6677f64621de70

  • SHA256

    520b8753ec07046c66e9df38fa53b95ffc442fca005b7b0daa30a289dc146b3b

  • SHA512

    c2c22e35d83786b490c09055a4e28bd2b05952eabe84381e24368edfee21befee06924a844644bb8c92198bddb071c1f73a5007219067aafd35de80d20ad2163

  • SSDEEP

    12288:+q/x7uJJAF++O+oWMa/2BNHhFvkKmKqB:+qtuJu0+nXO9fE

Malware Config

Targets

    • Target

      520b8753ec07046c66e9df38fa53b95ffc442fca005b7b0daa30a289dc146b3b

    • Size

      448KB

    • MD5

      526eae80ceb653f775d43213bfe6eb30

    • SHA1

      b5d0e5514c8df40312ad708dac6677f64621de70

    • SHA256

      520b8753ec07046c66e9df38fa53b95ffc442fca005b7b0daa30a289dc146b3b

    • SHA512

      c2c22e35d83786b490c09055a4e28bd2b05952eabe84381e24368edfee21befee06924a844644bb8c92198bddb071c1f73a5007219067aafd35de80d20ad2163

    • SSDEEP

      12288:+q/x7uJJAF++O+oWMa/2BNHhFvkKmKqB:+qtuJu0+nXO9fE

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks