General

  • Target

    5bca2ed68dac168a96e6a1ca77268baa89403add09bcf138826c018c771bc0b5

  • Size

    437KB

  • Sample

    221126-z3dkvaed66

  • MD5

    b8b4652071ae43b10e9007099b74c4c6

  • SHA1

    3bc764cfc503f09338ffdccfeb511a17ab358aaa

  • SHA256

    5bca2ed68dac168a96e6a1ca77268baa89403add09bcf138826c018c771bc0b5

  • SHA512

    52c467f58cab90bbb21cde35fa3532e5214e09418918a266e399632d9b89c11d60c429b2a7175ce775c2174bb252a857a51642c07734bb8978ef42da548a67b5

  • SSDEEP

    12288:U2hrIrduT4OTh8b+saZm2znH6NkFbz33/yWZLflDw:lUrdukmh8LZ2Ztz3PVLfJw

Malware Config

Targets

    • Target

      5bca2ed68dac168a96e6a1ca77268baa89403add09bcf138826c018c771bc0b5

    • Size

      437KB

    • MD5

      b8b4652071ae43b10e9007099b74c4c6

    • SHA1

      3bc764cfc503f09338ffdccfeb511a17ab358aaa

    • SHA256

      5bca2ed68dac168a96e6a1ca77268baa89403add09bcf138826c018c771bc0b5

    • SHA512

      52c467f58cab90bbb21cde35fa3532e5214e09418918a266e399632d9b89c11d60c429b2a7175ce775c2174bb252a857a51642c07734bb8978ef42da548a67b5

    • SSDEEP

      12288:U2hrIrduT4OTh8b+saZm2znH6NkFbz33/yWZLflDw:lUrdukmh8LZ2Ztz3PVLfJw

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks