General

  • Target

    ba4dc000d960320fa8d9668d26f4cd5c78bbd8e44ae04ae817584e456c92a251

  • Size

    591KB

  • Sample

    221123-qhnqmsha8x

  • MD5

    c18562474f24706670e0885df66c05e3

  • SHA1

    599c4cf063d1c7253fc7e96879356a5eeea75907

  • SHA256

    ba4dc000d960320fa8d9668d26f4cd5c78bbd8e44ae04ae817584e456c92a251

  • SHA512

    516c89b1082a3daef36f7c634699c18152fe612c99ff6360042917af220227edbaeafa2fd797e6de107c7e392000672fae2f711d6cc9cd35822d12bb1c4cdb50

  • SSDEEP

    12288:Cv+dNIpYv6qGVegup6kNlhyKklCfyBMVA+7YJ+/UvC7YeTVth:5mO6qIup6kBUzh7QscL

Malware Config

Targets

    • Target

      ba4dc000d960320fa8d9668d26f4cd5c78bbd8e44ae04ae817584e456c92a251

    • Size

      591KB

    • MD5

      c18562474f24706670e0885df66c05e3

    • SHA1

      599c4cf063d1c7253fc7e96879356a5eeea75907

    • SHA256

      ba4dc000d960320fa8d9668d26f4cd5c78bbd8e44ae04ae817584e456c92a251

    • SHA512

      516c89b1082a3daef36f7c634699c18152fe612c99ff6360042917af220227edbaeafa2fd797e6de107c7e392000672fae2f711d6cc9cd35822d12bb1c4cdb50

    • SSDEEP

      12288:Cv+dNIpYv6qGVegup6kNlhyKklCfyBMVA+7YJ+/UvC7YeTVth:5mO6qIup6kBUzh7QscL

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks