General

  • Target

    9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278

  • Size

    357KB

  • Sample

    221123-qyrggafb82

  • MD5

    bf4fe8d5d9c1eb3025af8d7a751d9c40

  • SHA1

    0dc50e178debf85f7e003eb8ead837514ee88a37

  • SHA256

    9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278

  • SHA512

    9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9

  • SSDEEP

    6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5

Malware Config

Targets

    • Target

      9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278

    • Size

      357KB

    • MD5

      bf4fe8d5d9c1eb3025af8d7a751d9c40

    • SHA1

      0dc50e178debf85f7e003eb8ead837514ee88a37

    • SHA256

      9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278

    • SHA512

      9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9

    • SSDEEP

      6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks