General

  • Target

    ea33954cd8edcd21ccf3b9a908d1447377af6e72307cecf1dc429500b64af41c

  • Size

    424KB

  • Sample

    221124-v2ygeacg7t

  • MD5

    c97745989a2fe42883a70ba85031c6a0

  • SHA1

    674bea907233ca122bfc58fbf9b828a6932d124b

  • SHA256

    ea33954cd8edcd21ccf3b9a908d1447377af6e72307cecf1dc429500b64af41c

  • SHA512

    ac3023df1ad2cbce99a768e984a9260a5bb64130379193502a1b1179ee71944ec74411c3d2316bc8e00513a684c3da4761d892178453bafcbd236b26990a2f16

  • SSDEEP

    6144:xhRclwK8QCYXpzDrNazp8PRjqpo1WYuMLcUoWldfIB75x4E3lxm:xhMCqgyZj+o1WY5wU1fIJ5xxm

Malware Config

Targets

    • Target

      ea33954cd8edcd21ccf3b9a908d1447377af6e72307cecf1dc429500b64af41c

    • Size

      424KB

    • MD5

      c97745989a2fe42883a70ba85031c6a0

    • SHA1

      674bea907233ca122bfc58fbf9b828a6932d124b

    • SHA256

      ea33954cd8edcd21ccf3b9a908d1447377af6e72307cecf1dc429500b64af41c

    • SHA512

      ac3023df1ad2cbce99a768e984a9260a5bb64130379193502a1b1179ee71944ec74411c3d2316bc8e00513a684c3da4761d892178453bafcbd236b26990a2f16

    • SSDEEP

      6144:xhRclwK8QCYXpzDrNazp8PRjqpo1WYuMLcUoWldfIB75x4E3lxm:xhMCqgyZj+o1WY5wU1fIJ5xxm

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks