General

  • Target

    c6f66898ab4ab5686050d9a03a84ca3988d3b9e4e047c7f6a7526c9ca46cd60f

  • Size

    260KB

  • Sample

    221203-gq9hmseb9z

  • MD5

    dd35f85322923c864042e32a7b897eed

  • SHA1

    656e6d5192a48f9d2f397d4e079920e26544f33d

  • SHA256

    c6f66898ab4ab5686050d9a03a84ca3988d3b9e4e047c7f6a7526c9ca46cd60f

  • SHA512

    59e8dfed9f519fa163ce82d9f10257c2299719caa02ea98ca4b92dfd12f546136549e9fd232f06230e9969fd26d1675b991427868746ddc68855937bf574a61c

  • SSDEEP

    6144:+xctcETisGSRcPwpSPsO5MyulQH1UjmWR1+MvA7Y3:+drhPwpSPKQH1USWVA7Y3

Malware Config

Targets

    • Target

      c6f66898ab4ab5686050d9a03a84ca3988d3b9e4e047c7f6a7526c9ca46cd60f

    • Size

      260KB

    • MD5

      dd35f85322923c864042e32a7b897eed

    • SHA1

      656e6d5192a48f9d2f397d4e079920e26544f33d

    • SHA256

      c6f66898ab4ab5686050d9a03a84ca3988d3b9e4e047c7f6a7526c9ca46cd60f

    • SHA512

      59e8dfed9f519fa163ce82d9f10257c2299719caa02ea98ca4b92dfd12f546136549e9fd232f06230e9969fd26d1675b991427868746ddc68855937bf574a61c

    • SSDEEP

      6144:+xctcETisGSRcPwpSPsO5MyulQH1UjmWR1+MvA7Y3:+drhPwpSPKQH1USWVA7Y3

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks