General

  • Target

    848b6ba49d84afdf4704dfb5bbe9d485f765c93cd7130562e8722a5e40e657f8

  • Size

    355KB

  • Sample

    221202-zlerkscf63

  • MD5

    3eb943bc2347fbe66d4ed99cf739b9ed

  • SHA1

    78eed9380d03c9762f9e7cf45413cbf6564e196c

  • SHA256

    848b6ba49d84afdf4704dfb5bbe9d485f765c93cd7130562e8722a5e40e657f8

  • SHA512

    963d820388a7c39f1ecaa43372cd6ac6ae8d6453aa22f989fcf0e61a34d6ec65afa1118634523da59e95c121c46aaf01f3cd7d2b21fe2b6d0943e6e85b1d6b9e

  • SSDEEP

    6144:TR9UfUfTajZcHQl+XQGEPVwCOa4sIj+IPqxo0zUgQ6z9rAlpZ+OldtmkcL5:X/2jaQgQGEPVzCn0zUgT9riod

Malware Config

Targets

    • Target

      848b6ba49d84afdf4704dfb5bbe9d485f765c93cd7130562e8722a5e40e657f8

    • Size

      355KB

    • MD5

      3eb943bc2347fbe66d4ed99cf739b9ed

    • SHA1

      78eed9380d03c9762f9e7cf45413cbf6564e196c

    • SHA256

      848b6ba49d84afdf4704dfb5bbe9d485f765c93cd7130562e8722a5e40e657f8

    • SHA512

      963d820388a7c39f1ecaa43372cd6ac6ae8d6453aa22f989fcf0e61a34d6ec65afa1118634523da59e95c121c46aaf01f3cd7d2b21fe2b6d0943e6e85b1d6b9e

    • SSDEEP

      6144:TR9UfUfTajZcHQl+XQGEPVwCOa4sIj+IPqxo0zUgQ6z9rAlpZ+OldtmkcL5:X/2jaQgQGEPVzCn0zUgT9riod

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks