General

  • Target

    407fbb0e90f9c8796917dfeb4af0ace4a90086b755637b7d39226878828f85bb

  • Size

    1.1MB

  • Sample

    221202-py3n3ahc75

  • MD5

    6edf09906508321bc02ee3dc1611c837

  • SHA1

    2e97064a575aa81a8b21a943ab8cf8b67ee9e462

  • SHA256

    407fbb0e90f9c8796917dfeb4af0ace4a90086b755637b7d39226878828f85bb

  • SHA512

    1470e6664b271d69056f20b5dd6b69800730994bdd55c250ca89e1e3b8fe559b2963803cf67ee74446369056494379fbce6352897eaa2e3362df2e1db852c43c

  • SSDEEP

    24576:KaHMv6Corjqny/Q5QfUtsqb/oY+XWRTnMFN5:K1vqjd/Q5QGCXWd2N5

Malware Config

Targets

    • Target

      407fbb0e90f9c8796917dfeb4af0ace4a90086b755637b7d39226878828f85bb

    • Size

      1.1MB

    • MD5

      6edf09906508321bc02ee3dc1611c837

    • SHA1

      2e97064a575aa81a8b21a943ab8cf8b67ee9e462

    • SHA256

      407fbb0e90f9c8796917dfeb4af0ace4a90086b755637b7d39226878828f85bb

    • SHA512

      1470e6664b271d69056f20b5dd6b69800730994bdd55c250ca89e1e3b8fe559b2963803cf67ee74446369056494379fbce6352897eaa2e3362df2e1db852c43c

    • SSDEEP

      24576:KaHMv6Corjqny/Q5QfUtsqb/oY+XWRTnMFN5:K1vqjd/Q5QGCXWd2N5

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks