General

  • Target

    7e421123e8b3b4b6e8716d6bfde807925f4d749f7cba3493e8147d14b2758e7f

  • Size

    624KB

  • Sample

    221130-3fmf1shf9t

  • MD5

    a6fc40105117a5663929134ace126bab

  • SHA1

    92448ef679c4bd601b20c9efb1afc3ebfd6dd5bc

  • SHA256

    7e421123e8b3b4b6e8716d6bfde807925f4d749f7cba3493e8147d14b2758e7f

  • SHA512

    cfbce633174f2b92c5e348b9a7477ba132befd82343b99090cd0d502ba1d774b25facbb131de1e692bd4b623dc4258f0b4b1cef90a1a113a8aa0a97211675794

  • SSDEEP

    12288:teO2NPnq1aOX5gfIRD2oZAaN7CANofcwrxBieAjgy7FJaGaY/mXO:tGxp254uLzIF0wrX9OxJam/me

Malware Config

Targets

    • Target

      7e421123e8b3b4b6e8716d6bfde807925f4d749f7cba3493e8147d14b2758e7f

    • Size

      624KB

    • MD5

      a6fc40105117a5663929134ace126bab

    • SHA1

      92448ef679c4bd601b20c9efb1afc3ebfd6dd5bc

    • SHA256

      7e421123e8b3b4b6e8716d6bfde807925f4d749f7cba3493e8147d14b2758e7f

    • SHA512

      cfbce633174f2b92c5e348b9a7477ba132befd82343b99090cd0d502ba1d774b25facbb131de1e692bd4b623dc4258f0b4b1cef90a1a113a8aa0a97211675794

    • SSDEEP

      12288:teO2NPnq1aOX5gfIRD2oZAaN7CANofcwrxBieAjgy7FJaGaY/mXO:tGxp254uLzIF0wrX9OxJam/me

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks