General

  • Target

    9c69f9317be25e1b0093ae6e71680e3a780ad6de50d107ba2a95aa99e25428d3

  • Size

    348KB

  • Sample

    221121-3gpmrseh5z

  • MD5

    b453220b49b118ebbd944d97e9682645

  • SHA1

    f19ad1944e4f9c23e3fd511e3227a2ea6ddf7662

  • SHA256

    9c69f9317be25e1b0093ae6e71680e3a780ad6de50d107ba2a95aa99e25428d3

  • SHA512

    066fae82aa017eaf9740db8432e913469ffc19ccd263f0c3f472ce7e0420428dbb55bbe9cb0ab3c509b942cd2014e7241afd3a7afdd5a90087a16a0942f4399a

  • SSDEEP

    6144:1HnblcoJamj2DMtBq+Gt1e7uaj+PHK8181HmMUKkCMK2lvErnwI8:ZblcoDKDeie5j78181iKTMK+vEt8

Malware Config

Targets

    • Target

      9c69f9317be25e1b0093ae6e71680e3a780ad6de50d107ba2a95aa99e25428d3

    • Size

      348KB

    • MD5

      b453220b49b118ebbd944d97e9682645

    • SHA1

      f19ad1944e4f9c23e3fd511e3227a2ea6ddf7662

    • SHA256

      9c69f9317be25e1b0093ae6e71680e3a780ad6de50d107ba2a95aa99e25428d3

    • SHA512

      066fae82aa017eaf9740db8432e913469ffc19ccd263f0c3f472ce7e0420428dbb55bbe9cb0ab3c509b942cd2014e7241afd3a7afdd5a90087a16a0942f4399a

    • SSDEEP

      6144:1HnblcoJamj2DMtBq+Gt1e7uaj+PHK8181HmMUKkCMK2lvErnwI8:ZblcoDKDeie5j78181iKTMK+vEt8

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks