General

  • Target

    ce1bbfd0bc2533735a974613ac9a724426a46911cd254c42a99b0c9efce5b9b8

  • Size

    404KB

  • Sample

    221128-w2dyfafc96

  • MD5

    ead7a0983267d4463c0b086a37dede9a

  • SHA1

    633ce2e4b6232f426c78f0a2420d1433a5368c2a

  • SHA256

    ce1bbfd0bc2533735a974613ac9a724426a46911cd254c42a99b0c9efce5b9b8

  • SHA512

    2c326a5e9c53c5741904a471b8ef840bc3fb5bd2b334a875c8d491ad9472979254679e4eb8504cd74d1d94182e303c0024bcbda8f2a33f17f08a2526a6208b51

  • SSDEEP

    6144:soiOGZ+YQh+zVZXbkBR23KtQZlq0f5srHyjwhz573pMV9UibW+c4:+e+zLqRr2ZMNowb73pMV97

Malware Config

Targets

    • Target

      ce1bbfd0bc2533735a974613ac9a724426a46911cd254c42a99b0c9efce5b9b8

    • Size

      404KB

    • MD5

      ead7a0983267d4463c0b086a37dede9a

    • SHA1

      633ce2e4b6232f426c78f0a2420d1433a5368c2a

    • SHA256

      ce1bbfd0bc2533735a974613ac9a724426a46911cd254c42a99b0c9efce5b9b8

    • SHA512

      2c326a5e9c53c5741904a471b8ef840bc3fb5bd2b334a875c8d491ad9472979254679e4eb8504cd74d1d94182e303c0024bcbda8f2a33f17f08a2526a6208b51

    • SSDEEP

      6144:soiOGZ+YQh+zVZXbkBR23KtQZlq0f5srHyjwhz573pMV9UibW+c4:+e+zLqRr2ZMNowb73pMV97

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks