General

  • Target

    9d978ed6ac2d5d4d980fb8d4f2190225b1e73ed0c1858f6cdded840c2f579b25

  • Size

    411KB

  • Sample

    221128-w2f3ssbd5z

  • MD5

    05de72909298f6ce51e8c0207db5a6c1

  • SHA1

    7a52632ad804a1a3cd8251f2c0a6517207dbde6e

  • SHA256

    9d978ed6ac2d5d4d980fb8d4f2190225b1e73ed0c1858f6cdded840c2f579b25

  • SHA512

    00334d94601f35db1a0d6c3e2d9b6c6981b386bf3845ecbd786e86e5e775578b568c2db75ad1f0587cd17dba1ce36a06f7d2a598cb2872767d9588c57adba2d5

  • SSDEEP

    12288:uSazSusUabSl3jl4EkYHJzhZoTLxFHuiN:uL3R4EjVyLnOiN

Malware Config

Targets

    • Target

      9d978ed6ac2d5d4d980fb8d4f2190225b1e73ed0c1858f6cdded840c2f579b25

    • Size

      411KB

    • MD5

      05de72909298f6ce51e8c0207db5a6c1

    • SHA1

      7a52632ad804a1a3cd8251f2c0a6517207dbde6e

    • SHA256

      9d978ed6ac2d5d4d980fb8d4f2190225b1e73ed0c1858f6cdded840c2f579b25

    • SHA512

      00334d94601f35db1a0d6c3e2d9b6c6981b386bf3845ecbd786e86e5e775578b568c2db75ad1f0587cd17dba1ce36a06f7d2a598cb2872767d9588c57adba2d5

    • SSDEEP

      12288:uSazSusUabSl3jl4EkYHJzhZoTLxFHuiN:uL3R4EjVyLnOiN

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks