General

  • Target

    1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba

  • Size

    452KB

  • Sample

    221127-bze3haaf97

  • MD5

    6310da29e3c9d8606ce05e96ae4fbcff

  • SHA1

    a75c9e7c7b3fa2988c960260f01ab746ea3ba228

  • SHA256

    1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba

  • SHA512

    aa8ad9036e165afec6b91c2757c2af60c9e0937cf08231d537b344d2d0804cb5b396858d0b2eadf3ccaf914ce23ae371ed8859dc6f176fe15d5c40a9322b798f

  • SSDEEP

    6144:jSrawA/kU4eYKLBa0eqWeOUb2qdjYbMIOL1B41uAXROPoBJOpOnnnnnnnnnnnnnC:jSrLA/9jeqaUb2quMIOL741uHQBQ

Malware Config

Targets

    • Target

      1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba

    • Size

      452KB

    • MD5

      6310da29e3c9d8606ce05e96ae4fbcff

    • SHA1

      a75c9e7c7b3fa2988c960260f01ab746ea3ba228

    • SHA256

      1a44a0bc93d4f829404adb03337d66684593f764c8cc959f2a0c80d6cd56bbba

    • SHA512

      aa8ad9036e165afec6b91c2757c2af60c9e0937cf08231d537b344d2d0804cb5b396858d0b2eadf3ccaf914ce23ae371ed8859dc6f176fe15d5c40a9322b798f

    • SSDEEP

      6144:jSrawA/kU4eYKLBa0eqWeOUb2qdjYbMIOL1B41uAXROPoBJOpOnnnnnnnnnnnnnC:jSrLA/9jeqaUb2quMIOL741uHQBQ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks