General

  • Target

    20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6

  • Size

    1013KB

  • Sample

    221121-3gl7mseh5x

  • MD5

    729d6040af9af63c748491a3f0b597fb

  • SHA1

    f8b7ac08d14581cc35770a34ba49aa273b6ff659

  • SHA256

    20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6

  • SHA512

    b5c9ddf44e268d7bd4cc690ef83e5c4ffdbb2ba90a391a73373ba48735a608747581d84c365bf644d3a2a38a6280ae93c376779822dc83fbab496f80700acb09

  • SSDEEP

    12288:RaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QQOJZri9oGE15jSsFZyoopMXnyTWn:AaHMv6Corjqny/QJJtkoRNFZyoRnyin

Malware Config

Targets

    • Target

      20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6

    • Size

      1013KB

    • MD5

      729d6040af9af63c748491a3f0b597fb

    • SHA1

      f8b7ac08d14581cc35770a34ba49aa273b6ff659

    • SHA256

      20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6

    • SHA512

      b5c9ddf44e268d7bd4cc690ef83e5c4ffdbb2ba90a391a73373ba48735a608747581d84c365bf644d3a2a38a6280ae93c376779822dc83fbab496f80700acb09

    • SSDEEP

      12288:RaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QQOJZri9oGE15jSsFZyoopMXnyTWn:AaHMv6Corjqny/QJJtkoRNFZyoRnyin

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks