General

  • Target

    dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65

  • Size

    1008KB

  • Sample

    221128-xjyessgh57

  • MD5

    d0d9e35c7366d20c4e2996600b5e32fb

  • SHA1

    b4f2b3bbffc7be2d643c3977c7ca864eed6ceb86

  • SHA256

    dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65

  • SHA512

    7b0278294f08787fda49b366a535ba0bb9fd3a213d70b2afa6e03746e226a14602c02a13d2e275b9337187ecb31579e49067c6b5378c9b03a2b7f75586d854cf

  • SSDEEP

    24576:NP3tMh0BxZC6AXPtWskmkNbY1XQXUpTfkDXfJH:R3tMh0k7PPkmPAMjkzB

Malware Config

Targets

    • Target

      dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65

    • Size

      1008KB

    • MD5

      d0d9e35c7366d20c4e2996600b5e32fb

    • SHA1

      b4f2b3bbffc7be2d643c3977c7ca864eed6ceb86

    • SHA256

      dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65

    • SHA512

      7b0278294f08787fda49b366a535ba0bb9fd3a213d70b2afa6e03746e226a14602c02a13d2e275b9337187ecb31579e49067c6b5378c9b03a2b7f75586d854cf

    • SSDEEP

      24576:NP3tMh0BxZC6AXPtWskmkNbY1XQXUpTfkDXfJH:R3tMh0k7PPkmPAMjkzB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks