General

  • Target

    ac474724d9fb41c8252fdeb3cabae9212b7a82bbef5d48cd45aa7c53a38ed34d

  • Size

    316KB

  • Sample

    221123-tpjxtaef86

  • MD5

    df3cdfe099877b9e5d8aa57cd6ac6cc4

  • SHA1

    4e76f3993e44826517c0d23c5357c386d2af5ae9

  • SHA256

    ac474724d9fb41c8252fdeb3cabae9212b7a82bbef5d48cd45aa7c53a38ed34d

  • SHA512

    a140c963de1d70246296e263586dfda76d64629cbd83e73d440d37ed53777b57a58b403bd1504e6cd4206874976ed8a8a2e714ab3ce7dc5919b2025313ee810d

  • SSDEEP

    6144:8F3jZLdg8k2nY3hx4rm2KNshkp3nzPO7wGfY0t1y6eeOdT:md3k2nLm2KNshq3zy/YD65KT

Malware Config

Targets

    • Target

      ac474724d9fb41c8252fdeb3cabae9212b7a82bbef5d48cd45aa7c53a38ed34d

    • Size

      316KB

    • MD5

      df3cdfe099877b9e5d8aa57cd6ac6cc4

    • SHA1

      4e76f3993e44826517c0d23c5357c386d2af5ae9

    • SHA256

      ac474724d9fb41c8252fdeb3cabae9212b7a82bbef5d48cd45aa7c53a38ed34d

    • SHA512

      a140c963de1d70246296e263586dfda76d64629cbd83e73d440d37ed53777b57a58b403bd1504e6cd4206874976ed8a8a2e714ab3ce7dc5919b2025313ee810d

    • SSDEEP

      6144:8F3jZLdg8k2nY3hx4rm2KNshkp3nzPO7wGfY0t1y6eeOdT:md3k2nLm2KNshq3zy/YD65KT

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks