General

  • Target

    2b71895667e9dc9fe1d91431e6e4b9f1477d323cc4fe07576aa4529c0e86a6bf

  • Size

    1.1MB

  • Sample

    221123-lwx41scd93

  • MD5

    df840378b0b0bb4beb391ab2d45aa352

  • SHA1

    b867297fda19144949a9e4333f6a8d8cf7aa81de

  • SHA256

    2b71895667e9dc9fe1d91431e6e4b9f1477d323cc4fe07576aa4529c0e86a6bf

  • SHA512

    dce14357f0d2a6b5661f5a2b1f5a5d2184c9585ba650576906864e9725625377cdc64acd077ec22e559c26dae042cfdacb0ee296e4a0c36cd432d97db9fdf443

  • SSDEEP

    24576:8RmJkqoQrilOIQ+yMxGaCVi0SQOb/yIwhCtS:tJXoQryTiMxGaCoOOb/yhQS

Malware Config

Targets

    • Target

      2b71895667e9dc9fe1d91431e6e4b9f1477d323cc4fe07576aa4529c0e86a6bf

    • Size

      1.1MB

    • MD5

      df840378b0b0bb4beb391ab2d45aa352

    • SHA1

      b867297fda19144949a9e4333f6a8d8cf7aa81de

    • SHA256

      2b71895667e9dc9fe1d91431e6e4b9f1477d323cc4fe07576aa4529c0e86a6bf

    • SHA512

      dce14357f0d2a6b5661f5a2b1f5a5d2184c9585ba650576906864e9725625377cdc64acd077ec22e559c26dae042cfdacb0ee296e4a0c36cd432d97db9fdf443

    • SSDEEP

      24576:8RmJkqoQrilOIQ+yMxGaCVi0SQOb/yIwhCtS:tJXoQryTiMxGaCoOOb/yhQS

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks