General

  • Target

    6d516cacdafd6aba0cb19db4b66b1fce73d3079d6c0775d14b463a2ef2fd27c4

  • Size

    1.1MB

  • Sample

    221126-ejzczsaf36

  • MD5

    fd284de48fceb1580a3a4f69e382cdb4

  • SHA1

    dee73f2265bac5427da3920e49a8bf5f1f3e7d93

  • SHA256

    6d516cacdafd6aba0cb19db4b66b1fce73d3079d6c0775d14b463a2ef2fd27c4

  • SHA512

    9a87fb545b73ff818d0b45e998a12a8a9e2ed0eb8400e029bbc65c19f48c324050214ae5a55458609a24f4a114e2065b64984eb9ae5c5262f855f508326cdb79

  • SSDEEP

    12288:/aWzgMg7v3qnCiMErQohh0F4CCJ8lny/Qo6oImr69oGE15jSsFZyoopSqM14C:iaHMv6Corjqny/Qo6DcsoRNFZyomW4C

Malware Config

Targets

    • Target

      6d516cacdafd6aba0cb19db4b66b1fce73d3079d6c0775d14b463a2ef2fd27c4

    • Size

      1.1MB

    • MD5

      fd284de48fceb1580a3a4f69e382cdb4

    • SHA1

      dee73f2265bac5427da3920e49a8bf5f1f3e7d93

    • SHA256

      6d516cacdafd6aba0cb19db4b66b1fce73d3079d6c0775d14b463a2ef2fd27c4

    • SHA512

      9a87fb545b73ff818d0b45e998a12a8a9e2ed0eb8400e029bbc65c19f48c324050214ae5a55458609a24f4a114e2065b64984eb9ae5c5262f855f508326cdb79

    • SSDEEP

      12288:/aWzgMg7v3qnCiMErQohh0F4CCJ8lny/Qo6oImr69oGE15jSsFZyoopSqM14C:iaHMv6Corjqny/Qo6DcsoRNFZyomW4C

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks