General

  • Target

    d09ab618e2b595bc4445f7bfeaba0992fa7fd3867e08c07b4303468314d44fa7

  • Size

    255KB

  • Sample

    221202-c7l2fseh59

  • MD5

    adf1acc5fb4a88da266cface36349692

  • SHA1

    1793dd9c32a24c4a2ee8c10c6a2f7ffdfda07849

  • SHA256

    d09ab618e2b595bc4445f7bfeaba0992fa7fd3867e08c07b4303468314d44fa7

  • SHA512

    e2c06a56ededd2b24d5f8412a347d1eda2abffc8a895c16921923c1b2a824ac4d0a56182188558eb8e1b6ba0fb9830bfea0f6c75ba6bd063faaae92115642e59

  • SSDEEP

    6144:+uYyW8dCtVEikIkgtHiAuRt4uGNM9MXuHQoIKdItPrSWVpADY:EyWl3kfiZuf4dqFHYKdItTSWj

Malware Config

Targets

    • Target

      d09ab618e2b595bc4445f7bfeaba0992fa7fd3867e08c07b4303468314d44fa7

    • Size

      255KB

    • MD5

      adf1acc5fb4a88da266cface36349692

    • SHA1

      1793dd9c32a24c4a2ee8c10c6a2f7ffdfda07849

    • SHA256

      d09ab618e2b595bc4445f7bfeaba0992fa7fd3867e08c07b4303468314d44fa7

    • SHA512

      e2c06a56ededd2b24d5f8412a347d1eda2abffc8a895c16921923c1b2a824ac4d0a56182188558eb8e1b6ba0fb9830bfea0f6c75ba6bd063faaae92115642e59

    • SSDEEP

      6144:+uYyW8dCtVEikIkgtHiAuRt4uGNM9MXuHQoIKdItPrSWVpADY:EyWl3kfiZuf4dqFHYKdItTSWj

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks