General

  • Target

    136002d7ae22998e809213358e95527a7f4abfd5f15cb86f9e2dfc6f2b5d3c7d

  • Size

    536KB

  • Sample

    221125-pvzg8scb4y

  • MD5

    1fdb559bbfdc8d360405d961d6d6b37c

  • SHA1

    25175cfd49045e96450c4820f613a27521c49ae0

  • SHA256

    136002d7ae22998e809213358e95527a7f4abfd5f15cb86f9e2dfc6f2b5d3c7d

  • SHA512

    6b5f87f559030278952d8efe9993ca9fda098a740f9de945f71d7669494c2399c8d18905eea0c3c160efc3cd7c4d1153c9e08e0078c2cb66b9ba90d0f9c24375

  • SSDEEP

    12288:1XW2OwDqUPHpsLxlQ2EbItjTXk54nUJH:Fhi4aNlQ9bIjTU54i

Malware Config

Targets

    • Target

      136002d7ae22998e809213358e95527a7f4abfd5f15cb86f9e2dfc6f2b5d3c7d

    • Size

      536KB

    • MD5

      1fdb559bbfdc8d360405d961d6d6b37c

    • SHA1

      25175cfd49045e96450c4820f613a27521c49ae0

    • SHA256

      136002d7ae22998e809213358e95527a7f4abfd5f15cb86f9e2dfc6f2b5d3c7d

    • SHA512

      6b5f87f559030278952d8efe9993ca9fda098a740f9de945f71d7669494c2399c8d18905eea0c3c160efc3cd7c4d1153c9e08e0078c2cb66b9ba90d0f9c24375

    • SSDEEP

      12288:1XW2OwDqUPHpsLxlQ2EbItjTXk54nUJH:Fhi4aNlQ9bIjTU54i

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks