General

  • Target

    895211dae5a0a1549fcba2a540134bc82d962d348c0f6f9f0be543e6f1028b86

  • Size

    299KB

  • Sample

    221126-w34kgsed33

  • MD5

    9fe12a07f9a466f4d53d72927b7c53af

  • SHA1

    7ca770481dc79d99c3e73cd5da59d80cdbe0fe1e

  • SHA256

    895211dae5a0a1549fcba2a540134bc82d962d348c0f6f9f0be543e6f1028b86

  • SHA512

    5600b13824622ba6a9276b1f5171944743dccba2ae211c00abd6d9866ce39281b91aa86e91c5c7e7e2c5e23ea29d66b57459fd4fc1587387b5dbc850885a890e

  • SSDEEP

    6144:2WFXSHcWqstITifKZwuH8F4W3cDXCqMAZJ76RBmx5LnvyP7yaO1uCfZ:XXtWhtmeqWs7UAZJrya1usZ

Malware Config

Targets

    • Target

      895211dae5a0a1549fcba2a540134bc82d962d348c0f6f9f0be543e6f1028b86

    • Size

      299KB

    • MD5

      9fe12a07f9a466f4d53d72927b7c53af

    • SHA1

      7ca770481dc79d99c3e73cd5da59d80cdbe0fe1e

    • SHA256

      895211dae5a0a1549fcba2a540134bc82d962d348c0f6f9f0be543e6f1028b86

    • SHA512

      5600b13824622ba6a9276b1f5171944743dccba2ae211c00abd6d9866ce39281b91aa86e91c5c7e7e2c5e23ea29d66b57459fd4fc1587387b5dbc850885a890e

    • SSDEEP

      6144:2WFXSHcWqstITifKZwuH8F4W3cDXCqMAZJ76RBmx5LnvyP7yaO1uCfZ:XXtWhtmeqWs7UAZJrya1usZ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks