General

  • Target

    a3c001d96a6423bd7665c2b287d0320c8bea56f351a51a7eed24353a2028b0c2

  • Size

    910KB

  • Sample

    221202-v6zv2adb5w

  • MD5

    db811c57db214dad46532e0635cd6dda

  • SHA1

    fa5079599bdef98564161451ad971a532c20d15b

  • SHA256

    a3c001d96a6423bd7665c2b287d0320c8bea56f351a51a7eed24353a2028b0c2

  • SHA512

    e753d056c25005dd2bc20a977240a7479b667000ab452b628e92ba6b6315f929d0183fa6170f8400d133388d14ca12d3e74fbfadbdf2fef343dfb1e622f37702

  • SSDEEP

    24576:yppWKKEKzqntnhEMGgVz0MlYBHu6nSCdrvk:41KEKYtnhTpIu6p

Malware Config

Targets

    • Target

      a3c001d96a6423bd7665c2b287d0320c8bea56f351a51a7eed24353a2028b0c2

    • Size

      910KB

    • MD5

      db811c57db214dad46532e0635cd6dda

    • SHA1

      fa5079599bdef98564161451ad971a532c20d15b

    • SHA256

      a3c001d96a6423bd7665c2b287d0320c8bea56f351a51a7eed24353a2028b0c2

    • SHA512

      e753d056c25005dd2bc20a977240a7479b667000ab452b628e92ba6b6315f929d0183fa6170f8400d133388d14ca12d3e74fbfadbdf2fef343dfb1e622f37702

    • SSDEEP

      24576:yppWKKEKzqntnhEMGgVz0MlYBHu6nSCdrvk:41KEKYtnhTpIu6p

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks