General

  • Target

    002d28a589e7f164a28488d34a8ebcacc49a44c4f0e5e5814d41ed94971d7f80

  • Size

    666KB

  • Sample

    221201-ma7a8scf7t

  • MD5

    5795ae6e311cede424e2a7177a0eb8b5

  • SHA1

    588b95b6f7538b66cf62060f92efa87cb5f64ee2

  • SHA256

    002d28a589e7f164a28488d34a8ebcacc49a44c4f0e5e5814d41ed94971d7f80

  • SHA512

    72d32ee07e352e8754a2f404e3e44d9ef315cf892d6abaca5a38b51c2a79b50cf4bdc28f56806cb37917ea35aa5ace940c419d1c6e1bea3e228b310688c349c4

  • SSDEEP

    12288:5RzXdmYc/0jwUdD6YKZfvqPqtCZ3mZWhuBBwsIhEmVh/1o:5tjhpKZfvqqIW8uBBAmmVhNo

Malware Config

Targets

    • Target

      002d28a589e7f164a28488d34a8ebcacc49a44c4f0e5e5814d41ed94971d7f80

    • Size

      666KB

    • MD5

      5795ae6e311cede424e2a7177a0eb8b5

    • SHA1

      588b95b6f7538b66cf62060f92efa87cb5f64ee2

    • SHA256

      002d28a589e7f164a28488d34a8ebcacc49a44c4f0e5e5814d41ed94971d7f80

    • SHA512

      72d32ee07e352e8754a2f404e3e44d9ef315cf892d6abaca5a38b51c2a79b50cf4bdc28f56806cb37917ea35aa5ace940c419d1c6e1bea3e228b310688c349c4

    • SSDEEP

      12288:5RzXdmYc/0jwUdD6YKZfvqPqtCZ3mZWhuBBwsIhEmVh/1o:5tjhpKZfvqqIW8uBBAmmVhNo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks