General

  • Target

    dff4e9f059ac7d25232de9806801285c91c9672c06f116393019e27ea93a22af

  • Size

    591KB

  • Sample

    221206-mfjgcshc65

  • MD5

    0834efddb9435dded5c3da54ff228b20

  • SHA1

    424842ccd83bc89aa5b71a6d1ba6d7313106e815

  • SHA256

    dff4e9f059ac7d25232de9806801285c91c9672c06f116393019e27ea93a22af

  • SHA512

    a329760633a75654ee9e4fe0c641a8d2752188b79b022367cee9345722279d8329ab7c761dca9ec50527dc0f070dbb049f0944cd697521054f40ae3c26b423a2

  • SSDEEP

    12288:f4To2d5Ji5By5e3Vw/s2l7rsZf/XPxGDyXSMCE4adjkp3bWW9:b2d5Ji5C8VwUD/xGuiGG5d

Malware Config

Targets

    • Target

      dff4e9f059ac7d25232de9806801285c91c9672c06f116393019e27ea93a22af

    • Size

      591KB

    • MD5

      0834efddb9435dded5c3da54ff228b20

    • SHA1

      424842ccd83bc89aa5b71a6d1ba6d7313106e815

    • SHA256

      dff4e9f059ac7d25232de9806801285c91c9672c06f116393019e27ea93a22af

    • SHA512

      a329760633a75654ee9e4fe0c641a8d2752188b79b022367cee9345722279d8329ab7c761dca9ec50527dc0f070dbb049f0944cd697521054f40ae3c26b423a2

    • SSDEEP

      12288:f4To2d5Ji5By5e3Vw/s2l7rsZf/XPxGDyXSMCE4adjkp3bWW9:b2d5Ji5C8VwUD/xGuiGG5d

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks