General

  • Target

    915ea44cfc6fe8417648d29ec180300f9e413c3d44e5afcf10627ebf42e77c19

  • Size

    223KB

  • Sample

    221206-mgd82ahd39

  • MD5

    81a53142e4c2449072cf3fe30da5125e

  • SHA1

    8bb7d8412cdabca78cf35d3f884988a83f51b03d

  • SHA256

    915ea44cfc6fe8417648d29ec180300f9e413c3d44e5afcf10627ebf42e77c19

  • SHA512

    18d7d7d4556bda3f1cc63956873635882a164dfe47cc425585b398616041ac6f703af3b4599599e0d5dd4ef034b975b30e99700621e79acac5abb8dfb7514e0c

  • SSDEEP

    3072:1z8iM8+Uk+Os7CpruqWqzG/COsp3VDfhGbLlIT/XlQOwm1qe:+8ozGi3NMvlYXlQne

Malware Config

Targets

    • Target

      915ea44cfc6fe8417648d29ec180300f9e413c3d44e5afcf10627ebf42e77c19

    • Size

      223KB

    • MD5

      81a53142e4c2449072cf3fe30da5125e

    • SHA1

      8bb7d8412cdabca78cf35d3f884988a83f51b03d

    • SHA256

      915ea44cfc6fe8417648d29ec180300f9e413c3d44e5afcf10627ebf42e77c19

    • SHA512

      18d7d7d4556bda3f1cc63956873635882a164dfe47cc425585b398616041ac6f703af3b4599599e0d5dd4ef034b975b30e99700621e79acac5abb8dfb7514e0c

    • SSDEEP

      3072:1z8iM8+Uk+Os7CpruqWqzG/COsp3VDfhGbLlIT/XlQOwm1qe:+8ozGi3NMvlYXlQne

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks