General

  • Target

    363284566ccb6103fcf30d4cd766e09fdcbe40afb2792b528d1f643a1baf4684

  • Size

    1.1MB

  • Sample

    221127-m5ff1aff4z

  • MD5

    021563e9bea3b8ba2aaf553c0788095a

  • SHA1

    609ec1923cfa157a7184c2cd3457c9f2cd0c95e7

  • SHA256

    363284566ccb6103fcf30d4cd766e09fdcbe40afb2792b528d1f643a1baf4684

  • SHA512

    21ec708452f00511dc7c371fa0cb78fcd50384b656708b144ad16b6dd3b457ef43777e2e0df87d2d0d33408e8a19144c7135a2b5aa38f81ee402461f46a3f9b5

  • SSDEEP

    12288:ZaWzgMg7v3qnCiMErQohh0F4CCJ8lny/Q6//r69oGE15jSsFZyoop6WCD+z:4aHMv6Corjqny/Q6/zsoRNFZyouC2

Malware Config

Targets

    • Target

      363284566ccb6103fcf30d4cd766e09fdcbe40afb2792b528d1f643a1baf4684

    • Size

      1.1MB

    • MD5

      021563e9bea3b8ba2aaf553c0788095a

    • SHA1

      609ec1923cfa157a7184c2cd3457c9f2cd0c95e7

    • SHA256

      363284566ccb6103fcf30d4cd766e09fdcbe40afb2792b528d1f643a1baf4684

    • SHA512

      21ec708452f00511dc7c371fa0cb78fcd50384b656708b144ad16b6dd3b457ef43777e2e0df87d2d0d33408e8a19144c7135a2b5aa38f81ee402461f46a3f9b5

    • SSDEEP

      12288:ZaWzgMg7v3qnCiMErQohh0F4CCJ8lny/Q6//r69oGE15jSsFZyoop6WCD+z:4aHMv6Corjqny/Q6/zsoRNFZyouC2

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks