General

  • Target

    7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57

  • Size

    446KB

  • Sample

    221119-lrlv7aad9y

  • MD5

    d64d05f5c5b596dbcc33d1c3c29bba36

  • SHA1

    f7224d9219f091fcb9f44e5f6d7a39f1703e56ac

  • SHA256

    7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57

  • SHA512

    f935140f11d9d39f60325210472c986a6c3b9eb789124fc6e07a8b394e09726677d7b6220999030bc11dae7d823d5e871c68d0eb0a3e50996514fc7caa943e1d

  • SSDEEP

    6144:F0c0T3+690+0yN5qnv/h4kZuNbdbCCqvN7VHD89QfulHHHvv8:F0c0K6K3SigBbCxN7VHD8yfu

Malware Config

Targets

    • Target

      7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57

    • Size

      446KB

    • MD5

      d64d05f5c5b596dbcc33d1c3c29bba36

    • SHA1

      f7224d9219f091fcb9f44e5f6d7a39f1703e56ac

    • SHA256

      7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57

    • SHA512

      f935140f11d9d39f60325210472c986a6c3b9eb789124fc6e07a8b394e09726677d7b6220999030bc11dae7d823d5e871c68d0eb0a3e50996514fc7caa943e1d

    • SSDEEP

      6144:F0c0T3+690+0yN5qnv/h4kZuNbdbCCqvN7VHD89QfulHHHvv8:F0c0K6K3SigBbCxN7VHD8yfu

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks