General

  • Target

    16b775d01e522b0631272e77daa42cb756e53b52528545f07a1d5f712227fdae

  • Size

    339KB

  • Sample

    221127-a6m61sca8x

  • MD5

    a2cf6d18298eb04d2959f5a6c70099d3

  • SHA1

    87e5e13e2d434a8d61988df6bd401ea27b354f8f

  • SHA256

    16b775d01e522b0631272e77daa42cb756e53b52528545f07a1d5f712227fdae

  • SHA512

    8c32f78af6945ab660f7277e58b9d17a5df96327b14d55dde2c5418a782d871cacca27f150f504c8e32ad6129ded765fb5b3df12d055087b36db40fbb2555281

  • SSDEEP

    6144:G8cPjWN+vQIMmBhnNMIRW6qS9JK6n0GbFL/dxVjiN7nfP8DHY:G8aSN+vQtm/DqkjFLFLwfPK4

Malware Config

Targets

    • Target

      16b775d01e522b0631272e77daa42cb756e53b52528545f07a1d5f712227fdae

    • Size

      339KB

    • MD5

      a2cf6d18298eb04d2959f5a6c70099d3

    • SHA1

      87e5e13e2d434a8d61988df6bd401ea27b354f8f

    • SHA256

      16b775d01e522b0631272e77daa42cb756e53b52528545f07a1d5f712227fdae

    • SHA512

      8c32f78af6945ab660f7277e58b9d17a5df96327b14d55dde2c5418a782d871cacca27f150f504c8e32ad6129ded765fb5b3df12d055087b36db40fbb2555281

    • SSDEEP

      6144:G8cPjWN+vQIMmBhnNMIRW6qS9JK6n0GbFL/dxVjiN7nfP8DHY:G8aSN+vQtm/DqkjFLFLwfPK4

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks