General

  • Target

    cfc00332745c24977e756b20630928a2f83d00fa233c8fcde2ebe7607908116f

  • Size

    351KB

  • Sample

    221124-xl5lwsga3s

  • MD5

    5f94e0e184d6bd6fcf78fc180d31f2b4

  • SHA1

    91ee2ea48262f151d711533f04b21d8e3d1447d2

  • SHA256

    cfc00332745c24977e756b20630928a2f83d00fa233c8fcde2ebe7607908116f

  • SHA512

    299700b4c89c682cd806bf23f1ed11646518f0a8d5de354bf743d66c4b86a2456fa109c9fff90accdb90890fdd4467f4e2c93fcba4c248ef6cf232679bbcc4e5

  • SSDEEP

    6144:j0HhrcbsYJOZpgg5XhMFBMXmXdiH8ZeW2Snzl+QYpAuWV8c:jGhQbshZ1rJmS8QWZRYpAT2c

Malware Config

Targets

    • Target

      cfc00332745c24977e756b20630928a2f83d00fa233c8fcde2ebe7607908116f

    • Size

      351KB

    • MD5

      5f94e0e184d6bd6fcf78fc180d31f2b4

    • SHA1

      91ee2ea48262f151d711533f04b21d8e3d1447d2

    • SHA256

      cfc00332745c24977e756b20630928a2f83d00fa233c8fcde2ebe7607908116f

    • SHA512

      299700b4c89c682cd806bf23f1ed11646518f0a8d5de354bf743d66c4b86a2456fa109c9fff90accdb90890fdd4467f4e2c93fcba4c248ef6cf232679bbcc4e5

    • SSDEEP

      6144:j0HhrcbsYJOZpgg5XhMFBMXmXdiH8ZeW2Snzl+QYpAuWV8c:jGhQbshZ1rJmS8QWZRYpAT2c

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks