General

  • Target

    8f6548a916deec038c9bf6b802145c097afc8e5035848bbd8153eedd0795cbd2

  • Size

    631KB

  • Sample

    221120-mwe4wadd7z

  • MD5

    f6ec96e239dbf62d3676420474b1ca1f

  • SHA1

    ca729d2a1805c7ba3a89d2e21a89834d3087ffd3

  • SHA256

    8f6548a916deec038c9bf6b802145c097afc8e5035848bbd8153eedd0795cbd2

  • SHA512

    e539810418b39b38817b9e1222d7c07c97ab18c190f604ab9ccbcbd00cfe2671a515d85724124a27d7e0bd3133447adb7a291e0c263935759dcae7516f790781

  • SSDEEP

    12288:xF6Lhd7O0+kLU1WECMbSBkfwIeEHDf8zQ3PeKb0kT+Bt6qg9UfdQJpJZKv:xF6V5OzkXkGazesDf8Q/eQ0kQNQJpJsv

Malware Config

Targets

    • Target

      8f6548a916deec038c9bf6b802145c097afc8e5035848bbd8153eedd0795cbd2

    • Size

      631KB

    • MD5

      f6ec96e239dbf62d3676420474b1ca1f

    • SHA1

      ca729d2a1805c7ba3a89d2e21a89834d3087ffd3

    • SHA256

      8f6548a916deec038c9bf6b802145c097afc8e5035848bbd8153eedd0795cbd2

    • SHA512

      e539810418b39b38817b9e1222d7c07c97ab18c190f604ab9ccbcbd00cfe2671a515d85724124a27d7e0bd3133447adb7a291e0c263935759dcae7516f790781

    • SSDEEP

      12288:xF6Lhd7O0+kLU1WECMbSBkfwIeEHDf8zQ3PeKb0kT+Bt6qg9UfdQJpJZKv:xF6V5OzkXkGazesDf8Q/eQ0kQNQJpJsv

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks