General

  • Target

    f8db5d2cad6f10867133309260241c56f5fd5339b1b44b99202d595d489466e2

  • Size

    476KB

  • Sample

    221201-h6rs7sfc29

  • MD5

    6741dc5ddd491db2b326f0fcad0b4790

  • SHA1

    4bd15a7d6b0f8245552b7b3dac53d83c6787758e

  • SHA256

    f8db5d2cad6f10867133309260241c56f5fd5339b1b44b99202d595d489466e2

  • SHA512

    4ba04046ef6bb9d6a7da0f9888dc795fc40b7ae8ddfbd1a8ae9e6dba8b3b4f5b7257484734ac72db87c18a4c309aa292fe90ff832ef95f959b6b263b19de1d85

  • SSDEEP

    12288:n9eKNv21hW2RuTX0AahjA0OBmu96LFFt:IKNu1gVX01hjaBr6X

Malware Config

Targets

    • Target

      f8db5d2cad6f10867133309260241c56f5fd5339b1b44b99202d595d489466e2

    • Size

      476KB

    • MD5

      6741dc5ddd491db2b326f0fcad0b4790

    • SHA1

      4bd15a7d6b0f8245552b7b3dac53d83c6787758e

    • SHA256

      f8db5d2cad6f10867133309260241c56f5fd5339b1b44b99202d595d489466e2

    • SHA512

      4ba04046ef6bb9d6a7da0f9888dc795fc40b7ae8ddfbd1a8ae9e6dba8b3b4f5b7257484734ac72db87c18a4c309aa292fe90ff832ef95f959b6b263b19de1d85

    • SSDEEP

      12288:n9eKNv21hW2RuTX0AahjA0OBmu96LFFt:IKNu1gVX01hjaBr6X

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks