General

  • Target

    a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68

  • Size

    1005KB

  • Sample

    221128-v4ky4age2w

  • MD5

    2d7e8e8cdeeaca9f5027dee94d7c1d5d

  • SHA1

    676ce435617ad00f570feaef0074c30d0526ba4b

  • SHA256

    a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68

  • SHA512

    54ffa24395e8dd73dd0bb448c15b53ad465254ab694a924919d2aab297381ed39d1a01da77d1192c90e0816b4e80abc5d445966a1efa5f75bbfcb6cd8677d93b

  • SSDEEP

    24576:YgWEXtey6BxhWU5951duuNACzX/QmLTt2Dp49JRxkHOh:/WWoBHx51dBNAit2N49Nk

Malware Config

Targets

    • Target

      a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68

    • Size

      1005KB

    • MD5

      2d7e8e8cdeeaca9f5027dee94d7c1d5d

    • SHA1

      676ce435617ad00f570feaef0074c30d0526ba4b

    • SHA256

      a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68

    • SHA512

      54ffa24395e8dd73dd0bb448c15b53ad465254ab694a924919d2aab297381ed39d1a01da77d1192c90e0816b4e80abc5d445966a1efa5f75bbfcb6cd8677d93b

    • SSDEEP

      24576:YgWEXtey6BxhWU5951duuNACzX/QmLTt2Dp49JRxkHOh:/WWoBHx51dBNAit2N49Nk

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks