General

  • Target

    c11aa9c584c70fac6fb7a56a98b132a0f2d524d65ca86a50d1771db51f6038fd

  • Size

    308KB

  • Sample

    221129-x2l5gsha35

  • MD5

    11a98277ce778f1f2dc200aa02846316

  • SHA1

    c6b54365bcb6d42912df005f6f9effdfa4ef688a

  • SHA256

    c11aa9c584c70fac6fb7a56a98b132a0f2d524d65ca86a50d1771db51f6038fd

  • SHA512

    4dfea0a05cac33feab07c3523defd43164f4fa66f097566f73ba5aac318196a26e6d5d5915a526dc9432e92861f55272accdece8090d7af1d85103d53a802a1c

  • SSDEEP

    3072:9YbmE/CXez1TggMQoXF1nnjioXA4sqw2KJrYlVH7QzFBxaquRtrfkxAVw9aap2XY:KKu5rOFNnj4dqCrYniEt36AtKK8QJy

Malware Config

Targets

    • Target

      c11aa9c584c70fac6fb7a56a98b132a0f2d524d65ca86a50d1771db51f6038fd

    • Size

      308KB

    • MD5

      11a98277ce778f1f2dc200aa02846316

    • SHA1

      c6b54365bcb6d42912df005f6f9effdfa4ef688a

    • SHA256

      c11aa9c584c70fac6fb7a56a98b132a0f2d524d65ca86a50d1771db51f6038fd

    • SHA512

      4dfea0a05cac33feab07c3523defd43164f4fa66f097566f73ba5aac318196a26e6d5d5915a526dc9432e92861f55272accdece8090d7af1d85103d53a802a1c

    • SSDEEP

      3072:9YbmE/CXez1TggMQoXF1nnjioXA4sqw2KJrYlVH7QzFBxaquRtrfkxAVw9aap2XY:KKu5rOFNnj4dqCrYniEt36AtKK8QJy

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks