General

  • Target

    cc5fb50f7f548e289ba543d37515bc8fd42855a6c003351d832545f0353aa998

  • Size

    239KB

  • Sample

    221206-l99d7sbg8x

  • MD5

    39e9d0668657ab131ef5d8650afa020d

  • SHA1

    9026cf67443274cb6e0bba6acd681a1a86eca04c

  • SHA256

    cc5fb50f7f548e289ba543d37515bc8fd42855a6c003351d832545f0353aa998

  • SHA512

    05dbca3c3627f6b27988589ff649ff7d74728f49919be19aa5d8f50a513d6a3be2ce8aa9361b46044577ec2813aa20e0f643ce6b73c8bd142386c64562bcfea6

  • SSDEEP

    3072:3KDAfCDSmJkWU2vSVL65GX5SErg7XVIdYjwDGlb6qsVcVyo7M85TnZhtG2ak6oZo:3RKvSVLJ96sYTp6qsVcVDnZhtUO34zJ

Malware Config

Targets

    • Target

      cc5fb50f7f548e289ba543d37515bc8fd42855a6c003351d832545f0353aa998

    • Size

      239KB

    • MD5

      39e9d0668657ab131ef5d8650afa020d

    • SHA1

      9026cf67443274cb6e0bba6acd681a1a86eca04c

    • SHA256

      cc5fb50f7f548e289ba543d37515bc8fd42855a6c003351d832545f0353aa998

    • SHA512

      05dbca3c3627f6b27988589ff649ff7d74728f49919be19aa5d8f50a513d6a3be2ce8aa9361b46044577ec2813aa20e0f643ce6b73c8bd142386c64562bcfea6

    • SSDEEP

      3072:3KDAfCDSmJkWU2vSVL65GX5SErg7XVIdYjwDGlb6qsVcVyo7M85TnZhtG2ak6oZo:3RKvSVLJ96sYTp6qsVcVDnZhtUO34zJ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks