General

  • Target

    96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f

  • Size

    405KB

  • Sample

    221120-mwv54add8y

  • MD5

    3a9ccc8c2e136158792d8f7fd20c88ef

  • SHA1

    c8d1514ebefae81e891a87deb18402dad7808b19

  • SHA256

    96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f

  • SHA512

    54bdcff52ba044988ae5717b55866c167b29af3b24453b54aae1638ff5749948aa3f1e5c628e3e91cedb9cfc475d1a4c991230a07a3081998d95d047f05743c5

  • SSDEEP

    12288:GdDlk4F3y0DTHY3DQn2T0uBVYrsHSFGZl3QWyThAc43Oww:GdDlk4F3yITHY3DQn2TdTASSkl3QWyTt

Malware Config

Targets

    • Target

      96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f

    • Size

      405KB

    • MD5

      3a9ccc8c2e136158792d8f7fd20c88ef

    • SHA1

      c8d1514ebefae81e891a87deb18402dad7808b19

    • SHA256

      96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f

    • SHA512

      54bdcff52ba044988ae5717b55866c167b29af3b24453b54aae1638ff5749948aa3f1e5c628e3e91cedb9cfc475d1a4c991230a07a3081998d95d047f05743c5

    • SSDEEP

      12288:GdDlk4F3y0DTHY3DQn2T0uBVYrsHSFGZl3QWyThAc43Oww:GdDlk4F3yITHY3DQn2TdTASSkl3QWyTt

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks