General

  • Target

    b89e1c18c072fe32313eeb8a4d2337078c02ffa76ef5b03b2085acec887a0f60

  • Size

    1.1MB

  • Sample

    221129-ryl3esca2x

  • MD5

    e0d065e59e9920927f8e305b6dc12ddf

  • SHA1

    3529cabd429339b3c1201adbff22ef8584c265c9

  • SHA256

    b89e1c18c072fe32313eeb8a4d2337078c02ffa76ef5b03b2085acec887a0f60

  • SHA512

    99765ffb4ba662809b7df5244140432daaf04fdaf7e6ebec2deb4a1d2c94c8b0be863240a60367ee1dd17123a5ce4bd7f74f3eb0bfb5ae60ec6646a483f0d1c9

  • SSDEEP

    24576:KaHMv6Corjqny/Q5yKOgtq7zyDiJMk2wQocwZPXK:K1vqjd/Q5yTMC2iJMdwQtw5XK

Malware Config

Targets

    • Target

      b89e1c18c072fe32313eeb8a4d2337078c02ffa76ef5b03b2085acec887a0f60

    • Size

      1.1MB

    • MD5

      e0d065e59e9920927f8e305b6dc12ddf

    • SHA1

      3529cabd429339b3c1201adbff22ef8584c265c9

    • SHA256

      b89e1c18c072fe32313eeb8a4d2337078c02ffa76ef5b03b2085acec887a0f60

    • SHA512

      99765ffb4ba662809b7df5244140432daaf04fdaf7e6ebec2deb4a1d2c94c8b0be863240a60367ee1dd17123a5ce4bd7f74f3eb0bfb5ae60ec6646a483f0d1c9

    • SSDEEP

      24576:KaHMv6Corjqny/Q5yKOgtq7zyDiJMk2wQocwZPXK:K1vqjd/Q5yTMC2iJMdwQtw5XK

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks