General

  • Target

    05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0

  • Size

    311KB

  • Sample

    221126-aspspacf9x

  • MD5

    903e424e8012d31fd6bfde2b6715a620

  • SHA1

    ebd025a6d84e561ba262f8ce987cf16819785f7b

  • SHA256

    05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0

  • SHA512

    bbd3406886b8685ebcba82aa0f571d21e8a359986a149e27979bee60aed7f9252dd7360d5db58ee899b3215fdb5c3e737f265a5582d8683bdf245dd188d76e45

  • SSDEEP

    6144:nlGAxVnth2DTlanWgvj9TyaXnckaREqjf:MYVnT/WSpyacFCSf

Malware Config

Targets

    • Target

      05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0

    • Size

      311KB

    • MD5

      903e424e8012d31fd6bfde2b6715a620

    • SHA1

      ebd025a6d84e561ba262f8ce987cf16819785f7b

    • SHA256

      05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0

    • SHA512

      bbd3406886b8685ebcba82aa0f571d21e8a359986a149e27979bee60aed7f9252dd7360d5db58ee899b3215fdb5c3e737f265a5582d8683bdf245dd188d76e45

    • SSDEEP

      6144:nlGAxVnth2DTlanWgvj9TyaXnckaREqjf:MYVnT/WSpyacFCSf

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks