General

  • Target

    84f05dc3388e320815b9b4213746055bf5fed22e284808f262d6b2fade256a49

  • Size

    396KB

  • Sample

    221128-w2gz4abd51

  • MD5

    a8ef2d5e506116cae0588c134067e490

  • SHA1

    3501032b5e4dce90617788656d45724379c461aa

  • SHA256

    84f05dc3388e320815b9b4213746055bf5fed22e284808f262d6b2fade256a49

  • SHA512

    15351b82a74d8131a6fa2c605c0fef357b6659d9980ee36bae2e4661dd4b688ffce23463afb75169bdbd1dac36e30ec3169e31c86cb0b1ca27b6ce774cb71938

  • SSDEEP

    12288:1sW8WRB7+0RDWj0h349/rC7Yt4ufjkz7hZJFiUzEA52JjH:yuRJ+tj0349/CaVgHhZJpn2JL

Malware Config

Targets

    • Target

      84f05dc3388e320815b9b4213746055bf5fed22e284808f262d6b2fade256a49

    • Size

      396KB

    • MD5

      a8ef2d5e506116cae0588c134067e490

    • SHA1

      3501032b5e4dce90617788656d45724379c461aa

    • SHA256

      84f05dc3388e320815b9b4213746055bf5fed22e284808f262d6b2fade256a49

    • SHA512

      15351b82a74d8131a6fa2c605c0fef357b6659d9980ee36bae2e4661dd4b688ffce23463afb75169bdbd1dac36e30ec3169e31c86cb0b1ca27b6ce774cb71938

    • SSDEEP

      12288:1sW8WRB7+0RDWj0h349/rC7Yt4ufjkz7hZJFiUzEA52JjH:yuRJ+tj0349/CaVgHhZJpn2JL

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks