General

  • Target

    425983cc82d0b23ad35586397a46ed5cba98af15a21d6266ddcf073006a9830c

  • Size

    1.3MB

  • Sample

    221123-rtrgcace2w

  • MD5

    ce2efcc4baef5fed9b20ad44cf4bf716

  • SHA1

    6b510ac7433d1cfe0c859b1cc36dbecfdd424619

  • SHA256

    425983cc82d0b23ad35586397a46ed5cba98af15a21d6266ddcf073006a9830c

  • SHA512

    01aa59a094d894df74e2aa9614d076326f1acfb6535107479375f4f8e626df6183291c4369d16190b7e6d6efc9a640b9f2b1d0d709d84c7890abedad2c573800

  • SSDEEP

    24576:4lmdVcLgnDAUf5AMpcDJ2WVcvBcC4zj9f7rQieJsU9eZ3Sv:umUgnD3byDcuhQi6e

Malware Config

Targets

    • Target

      425983cc82d0b23ad35586397a46ed5cba98af15a21d6266ddcf073006a9830c

    • Size

      1.3MB

    • MD5

      ce2efcc4baef5fed9b20ad44cf4bf716

    • SHA1

      6b510ac7433d1cfe0c859b1cc36dbecfdd424619

    • SHA256

      425983cc82d0b23ad35586397a46ed5cba98af15a21d6266ddcf073006a9830c

    • SHA512

      01aa59a094d894df74e2aa9614d076326f1acfb6535107479375f4f8e626df6183291c4369d16190b7e6d6efc9a640b9f2b1d0d709d84c7890abedad2c573800

    • SSDEEP

      24576:4lmdVcLgnDAUf5AMpcDJ2WVcvBcC4zj9f7rQieJsU9eZ3Sv:umUgnD3byDcuhQi6e

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks