General

  • Target

    314a5f41f4ca7ce0873bc046f874ac21d486867b15dfe6569a3577d932bc7a6c

  • Size

    916KB

  • Sample

    221130-pjecxsch9x

  • MD5

    040cf87c3c3f1dbfe298e4726e4dedc0

  • SHA1

    bfb1c427692d3d8a943fcc8c2404d7f413e779e4

  • SHA256

    314a5f41f4ca7ce0873bc046f874ac21d486867b15dfe6569a3577d932bc7a6c

  • SHA512

    ec39ef12051cb77a2c3a91f790bcf7dd9347c41d40b3b2322f2fef253cac78e8c1f83a772808568b34e1cc6ee2b3d4a10f29a0d199f401b4cf08d9fb2dfa5797

  • SSDEEP

    24576:gRmJkcoQricOIQxiZY1iaBnKyRifvSSZBRa:VJZoQrbTFZY1iaBnV4nS8BRa

Malware Config

Targets

    • Target

      314a5f41f4ca7ce0873bc046f874ac21d486867b15dfe6569a3577d932bc7a6c

    • Size

      916KB

    • MD5

      040cf87c3c3f1dbfe298e4726e4dedc0

    • SHA1

      bfb1c427692d3d8a943fcc8c2404d7f413e779e4

    • SHA256

      314a5f41f4ca7ce0873bc046f874ac21d486867b15dfe6569a3577d932bc7a6c

    • SHA512

      ec39ef12051cb77a2c3a91f790bcf7dd9347c41d40b3b2322f2fef253cac78e8c1f83a772808568b34e1cc6ee2b3d4a10f29a0d199f401b4cf08d9fb2dfa5797

    • SSDEEP

      24576:gRmJkcoQricOIQxiZY1iaBnKyRifvSSZBRa:VJZoQrbTFZY1iaBnV4nS8BRa

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks