General

  • Target

    10d767f0c54a1570faf75d506505d861d0871e0d7fa2fd6a035fc434bc7f9cef

  • Size

    308KB

  • Sample

    221126-p4lbzagh5s

  • MD5

    5002e89c367271d6bd5d00440561d47d

  • SHA1

    5ea5f809772bbc189e9876a3f0ece67b0d169251

  • SHA256

    10d767f0c54a1570faf75d506505d861d0871e0d7fa2fd6a035fc434bc7f9cef

  • SHA512

    dd555aa6a914739f79b67b5b51d2ebc5f8fb659b9ccaba1faafc4a24ba11c415a1d0073a16ab0254892984c285a0d360d57353380ac875353d67d842f6ef980f

  • SSDEEP

    6144:8q491F80mlLIGLSoDBUdLifi3J164MEmEzrsw7mulAdNqz4f:8v9C9VhSLn1Tm4rswsqU

Malware Config

Targets

    • Target

      10d767f0c54a1570faf75d506505d861d0871e0d7fa2fd6a035fc434bc7f9cef

    • Size

      308KB

    • MD5

      5002e89c367271d6bd5d00440561d47d

    • SHA1

      5ea5f809772bbc189e9876a3f0ece67b0d169251

    • SHA256

      10d767f0c54a1570faf75d506505d861d0871e0d7fa2fd6a035fc434bc7f9cef

    • SHA512

      dd555aa6a914739f79b67b5b51d2ebc5f8fb659b9ccaba1faafc4a24ba11c415a1d0073a16ab0254892984c285a0d360d57353380ac875353d67d842f6ef980f

    • SSDEEP

      6144:8q491F80mlLIGLSoDBUdLifi3J164MEmEzrsw7mulAdNqz4f:8v9C9VhSLn1Tm4rswsqU

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks