General

  • Target

    f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227

  • Size

    402KB

  • Sample

    221125-vlfawsbh45

  • MD5

    21838131e312ccc1629fbb4581f211fa

  • SHA1

    7f32c6f2900f5427c84cc00377ed6e04183b156c

  • SHA256

    f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227

  • SHA512

    20eb5ee491241d8b6d15d2c0b971a5938c7e5f4b37a87ae980a3f26c77fd4061f335f9c88fc824cb398a18ddccd7a2225468effc3f4b496c0addbe32f90a9a88

  • SSDEEP

    6144:VNzK2WpGt4j/5MeXF4RaQWiZULy75ad99XHgFswLtiJV35XU36OvelMjqZ:VRKrueMe+RrW9hWiJVFUKOGlMjqZ

Malware Config

Targets

    • Target

      f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227

    • Size

      402KB

    • MD5

      21838131e312ccc1629fbb4581f211fa

    • SHA1

      7f32c6f2900f5427c84cc00377ed6e04183b156c

    • SHA256

      f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227

    • SHA512

      20eb5ee491241d8b6d15d2c0b971a5938c7e5f4b37a87ae980a3f26c77fd4061f335f9c88fc824cb398a18ddccd7a2225468effc3f4b496c0addbe32f90a9a88

    • SSDEEP

      6144:VNzK2WpGt4j/5MeXF4RaQWiZULy75ad99XHgFswLtiJV35XU36OvelMjqZ:VRKrueMe+RrW9hWiJVFUKOGlMjqZ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks