General

  • Target

    775bd583bd249491ab0f2a897bd07d929f88dbfed965ad042366d42534e4bcba

  • Size

    465KB

  • Sample

    221206-lh1yrahc5v

  • MD5

    d4c4bd33eea49d0a477b793866a6f771

  • SHA1

    807a64d38e6d159dc11d99c7c85693905050e014

  • SHA256

    775bd583bd249491ab0f2a897bd07d929f88dbfed965ad042366d42534e4bcba

  • SHA512

    c29871102c6d98c02f88c9f9cb86c691d78bf63cc4f78aebd97aff91ee6f06ab8de9f4dfb43d8bb76cb7874b0b6e9a92367eec86bceb8a9b855f3e20894310b9

  • SSDEEP

    12288:zM/Y74wZDhvUWQopQdqSJ2eya9HaIuI3SeZ0Opu2:Y/4hiwSJay53SeZ0Opu2

Malware Config

Targets

    • Target

      775bd583bd249491ab0f2a897bd07d929f88dbfed965ad042366d42534e4bcba

    • Size

      465KB

    • MD5

      d4c4bd33eea49d0a477b793866a6f771

    • SHA1

      807a64d38e6d159dc11d99c7c85693905050e014

    • SHA256

      775bd583bd249491ab0f2a897bd07d929f88dbfed965ad042366d42534e4bcba

    • SHA512

      c29871102c6d98c02f88c9f9cb86c691d78bf63cc4f78aebd97aff91ee6f06ab8de9f4dfb43d8bb76cb7874b0b6e9a92367eec86bceb8a9b855f3e20894310b9

    • SSDEEP

      12288:zM/Y74wZDhvUWQopQdqSJ2eya9HaIuI3SeZ0Opu2:Y/4hiwSJay53SeZ0Opu2

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks