General

  • Target

    197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6

  • Size

    1.9MB

  • Sample

    221126-qv1wqsbb3t

  • MD5

    b6c924512eeb2bf21ee6238d3a3319aa

  • SHA1

    2e52443488b20f7675af80e8ed3911db4ba673a1

  • SHA256

    197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6

  • SHA512

    e1bcc6df964a5cf50de6659ca872d9f2bb2e5f92123358019bec28021278ac6d12c7f4627020bdcf81507a81449fd52f6739a2d258b1582b62d459aa15efc08a

  • SSDEEP

    49152:3zh0TB9kenwcdUC9g0zXNk+rRas21xh9qJMtn2bJ7Ck7n:jhkbkcwcH9g0zXGh1xhYMl2bJ7Cin

Malware Config

Targets

    • Target

      197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6

    • Size

      1.9MB

    • MD5

      b6c924512eeb2bf21ee6238d3a3319aa

    • SHA1

      2e52443488b20f7675af80e8ed3911db4ba673a1

    • SHA256

      197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6

    • SHA512

      e1bcc6df964a5cf50de6659ca872d9f2bb2e5f92123358019bec28021278ac6d12c7f4627020bdcf81507a81449fd52f6739a2d258b1582b62d459aa15efc08a

    • SSDEEP

      49152:3zh0TB9kenwcdUC9g0zXNk+rRas21xh9qJMtn2bJ7Ck7n:jhkbkcwcH9g0zXGh1xhYMl2bJ7Cin

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks