General

  • Target

    754715c6f455e7a25598cec24d8c38f09f0685d2e9628138f272d7bdeaec5d01

  • Size

    489KB

  • Sample

    221128-lpghpahe8z

  • MD5

    bb3ea4653a2b06e8f465458d29c9d061

  • SHA1

    fa24fc3cd1b31c6c79464c1792b14f26a538caf4

  • SHA256

    754715c6f455e7a25598cec24d8c38f09f0685d2e9628138f272d7bdeaec5d01

  • SHA512

    a971fa40f88213a94b1fe76e9801eb1260b0ea8c851278fd17ac0da826458fd0c5831f2c1c57cd130c05ea0066fe3f280c68ae86b2e73397f2fe81014500a85d

  • SSDEEP

    12288:4g5oRaLmsv9msfQmBMBZRsNdxVsNy6FpE00PLzId:hPL9v9msfQtRsNONy6PB0

Malware Config

Targets

    • Target

      754715c6f455e7a25598cec24d8c38f09f0685d2e9628138f272d7bdeaec5d01

    • Size

      489KB

    • MD5

      bb3ea4653a2b06e8f465458d29c9d061

    • SHA1

      fa24fc3cd1b31c6c79464c1792b14f26a538caf4

    • SHA256

      754715c6f455e7a25598cec24d8c38f09f0685d2e9628138f272d7bdeaec5d01

    • SHA512

      a971fa40f88213a94b1fe76e9801eb1260b0ea8c851278fd17ac0da826458fd0c5831f2c1c57cd130c05ea0066fe3f280c68ae86b2e73397f2fe81014500a85d

    • SSDEEP

      12288:4g5oRaLmsv9msfQmBMBZRsNdxVsNy6FpE00PLzId:hPL9v9msfQtRsNONy6PB0

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks