General

  • Target

    f7573d7942fed94b0f47751acad93bb460d81abcfacaaf679ce54457f2a4de18

  • Size

    444KB

  • Sample

    221124-atfw6sfc58

  • MD5

    14d9b535b18156471f510525bf93fe30

  • SHA1

    8286cdaa461516f8a446190748f955e262ce729b

  • SHA256

    f7573d7942fed94b0f47751acad93bb460d81abcfacaaf679ce54457f2a4de18

  • SHA512

    5723dc25b5a55da5d245315900b636a0fd6820583e0aece23d4aa30107f6713e5052967297f8c823058adf9fda2efed0497574191c4877513b373fd178e3fa15

  • SSDEEP

    12288:Jqcq3C4c0C3jaJBaPHaKx8Xk8NxagaElleY:kcczc3Ywt8XzNxagaClz

Malware Config

Targets

    • Target

      f7573d7942fed94b0f47751acad93bb460d81abcfacaaf679ce54457f2a4de18

    • Size

      444KB

    • MD5

      14d9b535b18156471f510525bf93fe30

    • SHA1

      8286cdaa461516f8a446190748f955e262ce729b

    • SHA256

      f7573d7942fed94b0f47751acad93bb460d81abcfacaaf679ce54457f2a4de18

    • SHA512

      5723dc25b5a55da5d245315900b636a0fd6820583e0aece23d4aa30107f6713e5052967297f8c823058adf9fda2efed0497574191c4877513b373fd178e3fa15

    • SSDEEP

      12288:Jqcq3C4c0C3jaJBaPHaKx8Xk8NxagaElleY:kcczc3Ywt8XzNxagaClz

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks