General

  • Target

    61550623ca9dab65da52310e8acd573d15d21e416df11be57d10c0be0162ab8d

  • Size

    358KB

  • Sample

    221125-a4y6hadf4w

  • MD5

    2c7c9f734313cad1fd7515e0e39aaaad

  • SHA1

    39a18302a714de9c081ca7843b9438cd2297f91d

  • SHA256

    61550623ca9dab65da52310e8acd573d15d21e416df11be57d10c0be0162ab8d

  • SHA512

    3e146738a602d76584ac76413be2949128e6e84a04eed61102f0f9f419cb952ed47c73fb5c5238d7104ffd6461485db622062128850dda7fd70a05cd7a94486a

  • SSDEEP

    6144:1Lon1m7VuwOCgOgmun3fEEVGCnt7jZFO6/OEb1d/Ck+X6Rp+6xq4hX3snt1e3:1LonI7VBOgunvtVPTAE1d/CPX6rB6tk

Malware Config

Targets

    • Target

      61550623ca9dab65da52310e8acd573d15d21e416df11be57d10c0be0162ab8d

    • Size

      358KB

    • MD5

      2c7c9f734313cad1fd7515e0e39aaaad

    • SHA1

      39a18302a714de9c081ca7843b9438cd2297f91d

    • SHA256

      61550623ca9dab65da52310e8acd573d15d21e416df11be57d10c0be0162ab8d

    • SHA512

      3e146738a602d76584ac76413be2949128e6e84a04eed61102f0f9f419cb952ed47c73fb5c5238d7104ffd6461485db622062128850dda7fd70a05cd7a94486a

    • SSDEEP

      6144:1Lon1m7VuwOCgOgmun3fEEVGCnt7jZFO6/OEb1d/Ck+X6Rp+6xq4hX3snt1e3:1LonI7VBOgunvtVPTAE1d/CPX6rB6tk

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks