General

  • Target

    aaa93cede01943c9f0e8d438c5a0d68bbc6f74d272430ff6e4db66bd45395463

  • Size

    501KB

  • Sample

    221123-qpkybsee46

  • MD5

    196d2f630152226123ee188acb62710e

  • SHA1

    dce60babf7d706df07026ed986bbd1131447ecde

  • SHA256

    aaa93cede01943c9f0e8d438c5a0d68bbc6f74d272430ff6e4db66bd45395463

  • SHA512

    fe3faa07d7f0d5717cf58a304b0190dda5d2ece7aee6ba32d49b594355851c3462614ab29d3ad7fbb59daacc1f89e134d73ed9bb7c9fb33dea2da7b7618007e4

  • SSDEEP

    12288:Z98a9fL0iOk9y8GcgNLQBtA5hRPYKPZnp1:T8UjXZ9y8GDQBgPYKR

Malware Config

Targets

    • Target

      aaa93cede01943c9f0e8d438c5a0d68bbc6f74d272430ff6e4db66bd45395463

    • Size

      501KB

    • MD5

      196d2f630152226123ee188acb62710e

    • SHA1

      dce60babf7d706df07026ed986bbd1131447ecde

    • SHA256

      aaa93cede01943c9f0e8d438c5a0d68bbc6f74d272430ff6e4db66bd45395463

    • SHA512

      fe3faa07d7f0d5717cf58a304b0190dda5d2ece7aee6ba32d49b594355851c3462614ab29d3ad7fbb59daacc1f89e134d73ed9bb7c9fb33dea2da7b7618007e4

    • SSDEEP

      12288:Z98a9fL0iOk9y8GcgNLQBtA5hRPYKPZnp1:T8UjXZ9y8GDQBgPYKR

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks