General

  • Target

    1ae74f90f7fd260d6821ab8fafa9055348c203c2c9282dbbbbaf6537a07f8c2e

  • Size

    709KB

  • Sample

    221127-m5gn3aff41

  • MD5

    226046de8f9c05b79277cee96e9b4404

  • SHA1

    f53c1944f94a7d36f5be4581d25574cf10af6b49

  • SHA256

    1ae74f90f7fd260d6821ab8fafa9055348c203c2c9282dbbbbaf6537a07f8c2e

  • SHA512

    22221b287abd636b53b21f54c5f885c0dd3f9dd9d65ff6d1932392300d83079c0a18149ccefd60aec4afa6bfda377c6ba73c5e8e459ed12dd01c2e477116e123

  • SSDEEP

    12288:EcEW+Mxp/VPa+fT7zZnzNmwGK15vgpw34oooURCRyh:Fp/1T7zawViwIobUCK

Malware Config

Targets

    • Target

      PURCHASE#ORDER#466657732883.exe

    • Size

      1.1MB

    • MD5

      021563e9bea3b8ba2aaf553c0788095a

    • SHA1

      609ec1923cfa157a7184c2cd3457c9f2cd0c95e7

    • SHA256

      363284566ccb6103fcf30d4cd766e09fdcbe40afb2792b528d1f643a1baf4684

    • SHA512

      21ec708452f00511dc7c371fa0cb78fcd50384b656708b144ad16b6dd3b457ef43777e2e0df87d2d0d33408e8a19144c7135a2b5aa38f81ee402461f46a3f9b5

    • SSDEEP

      12288:ZaWzgMg7v3qnCiMErQohh0F4CCJ8lny/Q6//r69oGE15jSsFZyoop6WCD+z:4aHMv6Corjqny/Q6/zsoRNFZyouC2

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks