General

  • Target

    f8be227a3ee9342184e540cc6f435b3121e56c3fe1e4d6a9bb4351d8f82bb021

  • Size

    485KB

  • Sample

    221127-rw1g2adh97

  • MD5

    62841697da27359623d72d5badf5d92b

  • SHA1

    8f359a32c968c8704f312161de0045571aa115ba

  • SHA256

    f8be227a3ee9342184e540cc6f435b3121e56c3fe1e4d6a9bb4351d8f82bb021

  • SHA512

    a75e6d2acbdc37ce71fc8955a9f44b17bc18b29a0cc2f1acd6961b304e6679fbeac21f9943668896c6381c57185766b3cecb3da76f1188c08d8f0022d0346c33

  • SSDEEP

    6144:JTWL/Jgcp+ZzyzEIPJhtQcYhND0NVVXZuuxrBGyMifRiyR4Kal6F4:YL3+ozPXtONQTJ8uFkyMipiyaKaU

Malware Config

Targets

    • Target

      f8be227a3ee9342184e540cc6f435b3121e56c3fe1e4d6a9bb4351d8f82bb021

    • Size

      485KB

    • MD5

      62841697da27359623d72d5badf5d92b

    • SHA1

      8f359a32c968c8704f312161de0045571aa115ba

    • SHA256

      f8be227a3ee9342184e540cc6f435b3121e56c3fe1e4d6a9bb4351d8f82bb021

    • SHA512

      a75e6d2acbdc37ce71fc8955a9f44b17bc18b29a0cc2f1acd6961b304e6679fbeac21f9943668896c6381c57185766b3cecb3da76f1188c08d8f0022d0346c33

    • SSDEEP

      6144:JTWL/Jgcp+ZzyzEIPJhtQcYhND0NVVXZuuxrBGyMifRiyR4Kal6F4:YL3+ozPXtONQTJ8uFkyMipiyaKaU

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks