General

  • Target

    51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16

  • Size

    336KB

  • Sample

    221201-jltbzaca5z

  • MD5

    ec298132c73e3a4a55fb3f7b8d070830

  • SHA1

    1b900fb2438b437e1cecab687f279623392a41dd

  • SHA256

    51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16

  • SHA512

    4741759518e310964bdf6bbd30ded231db2e333fc7299d1f209b7faf8c95a48c98f6cce30e363e6d599c32018c1fd364bd86223eaac7cddc9d24415b37b8ae61

  • SSDEEP

    6144:jiC6ngfT4Pm1wy9hWIWCtV3/rGBP5sgDiZUM5n98506WuK2T:jhfT4GmIbt9KBP5sqS98ZWL2

Malware Config

Targets

    • Target

      51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16

    • Size

      336KB

    • MD5

      ec298132c73e3a4a55fb3f7b8d070830

    • SHA1

      1b900fb2438b437e1cecab687f279623392a41dd

    • SHA256

      51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16

    • SHA512

      4741759518e310964bdf6bbd30ded231db2e333fc7299d1f209b7faf8c95a48c98f6cce30e363e6d599c32018c1fd364bd86223eaac7cddc9d24415b37b8ae61

    • SSDEEP

      6144:jiC6ngfT4Pm1wy9hWIWCtV3/rGBP5sgDiZUM5n98506WuK2T:jhfT4GmIbt9KBP5sqS98ZWL2

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks