General

  • Target

    03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998

  • Size

    979KB

  • Sample

    221130-nt22asgb44

  • MD5

    23fe7f45473cb509c65b8e7d62210b40

  • SHA1

    66842fba0fd099612c0b864ed145b17dea7360a9

  • SHA256

    03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998

  • SHA512

    5b79c781a0d3e60dcfc4461414023fabffba62b0247129dc7e673a645e81af9680b9c5f7a7df88d7193a4d019f87db1beab957746e7247888bfb69a66ade74d6

  • SSDEEP

    12288:X/I8SxX6H5G+d3+Q/lbJwgXt06doUe2LDdX7G4oWZqCt5MOxz2IhR7LwQSX3fw1k:MuGW7zdx5XJZUAi/Xvo1f7sr8

Malware Config

Targets

    • Target

      03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998

    • Size

      979KB

    • MD5

      23fe7f45473cb509c65b8e7d62210b40

    • SHA1

      66842fba0fd099612c0b864ed145b17dea7360a9

    • SHA256

      03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998

    • SHA512

      5b79c781a0d3e60dcfc4461414023fabffba62b0247129dc7e673a645e81af9680b9c5f7a7df88d7193a4d019f87db1beab957746e7247888bfb69a66ade74d6

    • SSDEEP

      12288:X/I8SxX6H5G+d3+Q/lbJwgXt06doUe2LDdX7G4oWZqCt5MOxz2IhR7LwQSX3fw1k:MuGW7zdx5XJZUAi/Xvo1f7sr8

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks