General

  • Target

    fbc3e502aca3c03dddab287cc03afa103ecf644ae8690c5a21f9aa885803f5b9

  • Size

    808KB

  • Sample

    221203-m6kr4sdh37

  • MD5

    d501362eabe646ccd66b5c6e771bbd35

  • SHA1

    bde19480d2fd319553dbf1dd6097028e4b65d2ad

  • SHA256

    fbc3e502aca3c03dddab287cc03afa103ecf644ae8690c5a21f9aa885803f5b9

  • SHA512

    5ec5b0d1bf528dc1e13022fb03e6f6a0b4058f985c574fc27db98a2e9527a786e993fef8fe5074d12666c352f59a2fa7f16edb6fdf4f7f51d056bd39c9cca993

  • SSDEEP

    12288:jzRzCUuOz3kQc1G6jwX8OR72oWbU4jWy8ExZzjzlVNxpVhyAxFStKrSAdFLc:jtCUuOgQc13jvOFHWbU46mxF3X3uP

Malware Config

Targets

    • Target

      fbc3e502aca3c03dddab287cc03afa103ecf644ae8690c5a21f9aa885803f5b9

    • Size

      808KB

    • MD5

      d501362eabe646ccd66b5c6e771bbd35

    • SHA1

      bde19480d2fd319553dbf1dd6097028e4b65d2ad

    • SHA256

      fbc3e502aca3c03dddab287cc03afa103ecf644ae8690c5a21f9aa885803f5b9

    • SHA512

      5ec5b0d1bf528dc1e13022fb03e6f6a0b4058f985c574fc27db98a2e9527a786e993fef8fe5074d12666c352f59a2fa7f16edb6fdf4f7f51d056bd39c9cca993

    • SSDEEP

      12288:jzRzCUuOz3kQc1G6jwX8OR72oWbU4jWy8ExZzjzlVNxpVhyAxFStKrSAdFLc:jtCUuOgQc13jvOFHWbU46mxF3X3uP

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks