General

  • Target

    2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53

  • Size

    1.0MB

  • Sample

    221123-zpz7pade24

  • MD5

    174505b7760c7282e1a9968b6cba6201

  • SHA1

    660ddb36bc89927426411052e0de4d208d084830

  • SHA256

    2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53

  • SHA512

    5ae50f25a3fbbce2e329e9ba0bed2247aa58ed5b2b5102235b69d4575fd041b5bb63ba8d8f0ea73fc958d0ff8b7957382b168df9ed7173a19ad7883183dee62e

  • SSDEEP

    12288:VH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QwtQM9wgNaEP5rKtOnrZsWzK:VbCj2sObHtqQ4QM9vNacNK0SQOb/9

Malware Config

Targets

    • Target

      2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53

    • Size

      1.0MB

    • MD5

      174505b7760c7282e1a9968b6cba6201

    • SHA1

      660ddb36bc89927426411052e0de4d208d084830

    • SHA256

      2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53

    • SHA512

      5ae50f25a3fbbce2e329e9ba0bed2247aa58ed5b2b5102235b69d4575fd041b5bb63ba8d8f0ea73fc958d0ff8b7957382b168df9ed7173a19ad7883183dee62e

    • SSDEEP

      12288:VH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QwtQM9wgNaEP5rKtOnrZsWzK:VbCj2sObHtqQ4QM9vNacNK0SQOb/9

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks