General

  • Target

    e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e

  • Size

    556KB

  • Sample

    221127-dbmtjshc6w

  • MD5

    6790f0bf067752bfaf78ba990124f2a3

  • SHA1

    aacfbd563a2b8d691d6a48b0037f8f27a5a67273

  • SHA256

    e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e

  • SHA512

    f0cc570c3a10b27567df91281eaf48ff3b56092c4453171086510ac1d804f86c06f239274307cc85c9aeb4742ca18d50f6efbf66f8be1a1c308df3852a2b4c80

  • SSDEEP

    12288:yqy7GFKFPOQ1g83Qa04/mAB/3+xnrMVbAW2:exROQ1gBFWbAW

Malware Config

Targets

    • Target

      e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e

    • Size

      556KB

    • MD5

      6790f0bf067752bfaf78ba990124f2a3

    • SHA1

      aacfbd563a2b8d691d6a48b0037f8f27a5a67273

    • SHA256

      e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e

    • SHA512

      f0cc570c3a10b27567df91281eaf48ff3b56092c4453171086510ac1d804f86c06f239274307cc85c9aeb4742ca18d50f6efbf66f8be1a1c308df3852a2b4c80

    • SSDEEP

      12288:yqy7GFKFPOQ1g83Qa04/mAB/3+xnrMVbAW2:exROQ1gBFWbAW

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks