General

  • Target

    ed096e0b518ef9b8ce600308639805760d29b3edced26c9db3a865e3c63fbc0e

  • Size

    237KB

  • Sample

    221202-a4pbasbe9s

  • MD5

    a73d713c66daf3c883c1c324a3fd366c

  • SHA1

    09df2d614f6e84130b37bafeae2e9f055069c21b

  • SHA256

    ed096e0b518ef9b8ce600308639805760d29b3edced26c9db3a865e3c63fbc0e

  • SHA512

    2d14c1378c8c0a424dc4e3e1c887550c37fa68aea61cfed59f44778b3c3dcb4531f6b63913549ea63d62e315ab34ee7f4b350fdd0e7f9199e6f9036656e24be7

  • SSDEEP

    6144:wTqPRRdIKCC0ef//uXltKc+LVsz9b8BK:7dFeCXuLKcCVsz6B

Malware Config

Targets

    • Target

      ed096e0b518ef9b8ce600308639805760d29b3edced26c9db3a865e3c63fbc0e

    • Size

      237KB

    • MD5

      a73d713c66daf3c883c1c324a3fd366c

    • SHA1

      09df2d614f6e84130b37bafeae2e9f055069c21b

    • SHA256

      ed096e0b518ef9b8ce600308639805760d29b3edced26c9db3a865e3c63fbc0e

    • SHA512

      2d14c1378c8c0a424dc4e3e1c887550c37fa68aea61cfed59f44778b3c3dcb4531f6b63913549ea63d62e315ab34ee7f4b350fdd0e7f9199e6f9036656e24be7

    • SSDEEP

      6144:wTqPRRdIKCC0ef//uXltKc+LVsz9b8BK:7dFeCXuLKcCVsz6B

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks