General

  • Target

    fe1b9b6ad75515cf48c104bccfb190a9cd472f39e2d35b8fb5d091525eb07101

  • Size

    921KB

  • Sample

    221203-a9tszaba74

  • MD5

    8d2e6aaf036b58a9add40aa5494341cc

  • SHA1

    2eda98477ea42f59cbdea471381986822dbdf416

  • SHA256

    fe1b9b6ad75515cf48c104bccfb190a9cd472f39e2d35b8fb5d091525eb07101

  • SHA512

    7aa1eee4f10ff010fc760e105bcadd03d8f1a5d3927cf736c77b3ef7c8d606b750a00d387b89982903d0b30af07eb92aaf3dc87c9e02a41ab2696dc1fbd8bbe0

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaChSdwaPjstiPy+:7JZoQrbTFZY1iaCmGP+

Malware Config

Targets

    • Target

      fe1b9b6ad75515cf48c104bccfb190a9cd472f39e2d35b8fb5d091525eb07101

    • Size

      921KB

    • MD5

      8d2e6aaf036b58a9add40aa5494341cc

    • SHA1

      2eda98477ea42f59cbdea471381986822dbdf416

    • SHA256

      fe1b9b6ad75515cf48c104bccfb190a9cd472f39e2d35b8fb5d091525eb07101

    • SHA512

      7aa1eee4f10ff010fc760e105bcadd03d8f1a5d3927cf736c77b3ef7c8d606b750a00d387b89982903d0b30af07eb92aaf3dc87c9e02a41ab2696dc1fbd8bbe0

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaChSdwaPjstiPy+:7JZoQrbTFZY1iaCmGP+

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks