General

  • Target

    9b933a1465ef307beccd52d53b5f087862a32997199d2f475a0856baea1470be

  • Size

    357KB

  • Sample

    221129-e85lasac7t

  • MD5

    87745db6b706ee4ac5900838c661e1d3

  • SHA1

    c6dd4ce078b86f216dc50c6107b116fea55dcf48

  • SHA256

    9b933a1465ef307beccd52d53b5f087862a32997199d2f475a0856baea1470be

  • SHA512

    0ae59abeb0be99519dcfbddce89f19e367dd80c84259fb0548e88d2ee3380d9cbcaf29448555936fb487d2d30e84382dc334b7aba40ac72c289469e45cbf7289

  • SSDEEP

    6144:qowYxgI2hA+Uk2CNxcenTLt1ukosGo4M52QJTbGVzxNX3d1vpTMK3fmlj0+B2Vfe:qowYxL2urqxNvDdl5JQxNXnxTjx+B2Vf

Malware Config

Targets

    • Target

      9b933a1465ef307beccd52d53b5f087862a32997199d2f475a0856baea1470be

    • Size

      357KB

    • MD5

      87745db6b706ee4ac5900838c661e1d3

    • SHA1

      c6dd4ce078b86f216dc50c6107b116fea55dcf48

    • SHA256

      9b933a1465ef307beccd52d53b5f087862a32997199d2f475a0856baea1470be

    • SHA512

      0ae59abeb0be99519dcfbddce89f19e367dd80c84259fb0548e88d2ee3380d9cbcaf29448555936fb487d2d30e84382dc334b7aba40ac72c289469e45cbf7289

    • SSDEEP

      6144:qowYxgI2hA+Uk2CNxcenTLt1ukosGo4M52QJTbGVzxNX3d1vpTMK3fmlj0+B2Vfe:qowYxL2urqxNvDdl5JQxNXnxTjx+B2Vf

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks