General

  • Target

    4ce1b099d3e0a4198602e797e38e3cf183edcf26c6c911a725146d41b7917eae

  • Size

    567KB

  • Sample

    221128-mr16jsgc59

  • MD5

    481ed407e75685b552fc1fd9fb5eca38

  • SHA1

    5af33a34ce57af7387eb379e3d5ab8b450e5f3b0

  • SHA256

    4ce1b099d3e0a4198602e797e38e3cf183edcf26c6c911a725146d41b7917eae

  • SHA512

    c36e01cdc58991f0cddb7c80ad4bb06b18d95c09f8109b1b36e7343fc0705c9ded9f075d7e06f209d033e37aba17f7117c95741886f305f7c0cc9bc92fa8ab10

  • SSDEEP

    12288:odS/kWXb+BSC9GKhTej/NM7N2BMYAx7DrT6lnd1G7p:CScmkSC9Gx/NM7N2mYizZp

Malware Config

Targets

    • Target

      4ce1b099d3e0a4198602e797e38e3cf183edcf26c6c911a725146d41b7917eae

    • Size

      567KB

    • MD5

      481ed407e75685b552fc1fd9fb5eca38

    • SHA1

      5af33a34ce57af7387eb379e3d5ab8b450e5f3b0

    • SHA256

      4ce1b099d3e0a4198602e797e38e3cf183edcf26c6c911a725146d41b7917eae

    • SHA512

      c36e01cdc58991f0cddb7c80ad4bb06b18d95c09f8109b1b36e7343fc0705c9ded9f075d7e06f209d033e37aba17f7117c95741886f305f7c0cc9bc92fa8ab10

    • SSDEEP

      12288:odS/kWXb+BSC9GKhTej/NM7N2BMYAx7DrT6lnd1G7p:CScmkSC9Gx/NM7N2mYizZp

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks