General

  • Target

    4366f72681a05bae5e0b3677d052695bcabcd6a004ccc5c85dc6e94e20f2659b

  • Size

    955KB

  • Sample

    221123-wep27aef6t

  • MD5

    53577d9b7eedf7135a1dfcec08af74f1

  • SHA1

    8c2b67354d3a08b21e08c4babaa4c682a6307d09

  • SHA256

    4366f72681a05bae5e0b3677d052695bcabcd6a004ccc5c85dc6e94e20f2659b

  • SHA512

    a207bd289a22a83c5d1b6f750b220f3ae88f92d2ddf4c66ddd29c2957498f1c43aa8b8827e8cf95db4e3e156ff1dc910bfc581d6d8a1808602cffc2f3a61f504

  • SSDEEP

    24576:8RmJkcoQricOIQxiZY1iaYzKo4rULiy+LHevBVSAgkQE:pJZoQrbTFZY1iaYz1ULqEFE

Malware Config

Targets

    • Target

      4366f72681a05bae5e0b3677d052695bcabcd6a004ccc5c85dc6e94e20f2659b

    • Size

      955KB

    • MD5

      53577d9b7eedf7135a1dfcec08af74f1

    • SHA1

      8c2b67354d3a08b21e08c4babaa4c682a6307d09

    • SHA256

      4366f72681a05bae5e0b3677d052695bcabcd6a004ccc5c85dc6e94e20f2659b

    • SHA512

      a207bd289a22a83c5d1b6f750b220f3ae88f92d2ddf4c66ddd29c2957498f1c43aa8b8827e8cf95db4e3e156ff1dc910bfc581d6d8a1808602cffc2f3a61f504

    • SSDEEP

      24576:8RmJkcoQricOIQxiZY1iaYzKo4rULiy+LHevBVSAgkQE:pJZoQrbTFZY1iaYz1ULqEFE

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks