General

  • Target

    024140fb411c120a4f7bdab9a46959b60da178910106bd0d73196a479243947c

  • Size

    548KB

  • Sample

    221129-bs1evsfa57

  • MD5

    4d6bc1d7974c06161e1ed65c7f0a20a8

  • SHA1

    1a98ef9a70d39f916a81e0e8c9cf95c8c145744b

  • SHA256

    024140fb411c120a4f7bdab9a46959b60da178910106bd0d73196a479243947c

  • SHA512

    c2d1b78364de65346e64e0fd0bed87c4ab110de1e03705b68489503f5069053a647d478c7b0c5217cc8f9f40fe39deceb2c809a714a92ffc8c741d273799e5ee

  • SSDEEP

    6144:tkAH0NoFM7OnNbxu3xWADqEenYqOzUHnjir1TApaBtDVFlQYnGLUHFop5Ny05dS7:trFBtfDcapaBtDpHFY+0+FskukB1Hd

Malware Config

Targets

    • Target

      024140fb411c120a4f7bdab9a46959b60da178910106bd0d73196a479243947c

    • Size

      548KB

    • MD5

      4d6bc1d7974c06161e1ed65c7f0a20a8

    • SHA1

      1a98ef9a70d39f916a81e0e8c9cf95c8c145744b

    • SHA256

      024140fb411c120a4f7bdab9a46959b60da178910106bd0d73196a479243947c

    • SHA512

      c2d1b78364de65346e64e0fd0bed87c4ab110de1e03705b68489503f5069053a647d478c7b0c5217cc8f9f40fe39deceb2c809a714a92ffc8c741d273799e5ee

    • SSDEEP

      6144:tkAH0NoFM7OnNbxu3xWADqEenYqOzUHnjir1TApaBtDVFlQYnGLUHFop5Ny05dS7:trFBtfDcapaBtDpHFY+0+FskukB1Hd

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks