General

  • Target

    571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7

  • Size

    377KB

  • Sample

    221126-abxf7sbe3x

  • MD5

    388ceb608b170c58c29f10ddeeb3c9f3

  • SHA1

    24edfd36e667f0ba3fc56a7b3113691bd62ddf68

  • SHA256

    571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7

  • SHA512

    72f89e463ef5fb0d73729095f0bf9206b693b82245973ae98491d73a8a5d01c91463504cc27ea1acdddac9b17177da3da4f9e8b1d5acf02e6f20e47948ed40d8

  • SSDEEP

    6144:ulGAxVnthTDjyTiv+4PCbm2D8LB+//wp4kfU0VW3jEDW+KQveg177cfwW+:NYVnTXeTZb/4g/KdXcADpeg177cfe

Malware Config

Targets

    • Target

      571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7

    • Size

      377KB

    • MD5

      388ceb608b170c58c29f10ddeeb3c9f3

    • SHA1

      24edfd36e667f0ba3fc56a7b3113691bd62ddf68

    • SHA256

      571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7

    • SHA512

      72f89e463ef5fb0d73729095f0bf9206b693b82245973ae98491d73a8a5d01c91463504cc27ea1acdddac9b17177da3da4f9e8b1d5acf02e6f20e47948ed40d8

    • SSDEEP

      6144:ulGAxVnthTDjyTiv+4PCbm2D8LB+//wp4kfU0VW3jEDW+KQveg177cfwW+:NYVnTXeTZb/4g/KdXcADpeg177cfe

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks