General

  • Target

    3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604

  • Size

    500KB

  • Sample

    221207-cyrwcagb29

  • MD5

    55a6f3e924a18d368756c29d582a3e67

  • SHA1

    4e19a9ee30d00f829ca884b0ab9b43e3d6b3f778

  • SHA256

    3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604

  • SHA512

    380c1cd13ce5ceab2db30d2d4a71d4a5315a8b8321dc8928cb33d34ea6aabbaccb9dffa5f783d1fb5ad1aed92701acb5601c1c7e1a419014b394e0cfe44ffa8c

  • SSDEEP

    12288:ozE679I8/ZdkB7qeGvRHHVlXqgGzP+4WvX5nxzpsBc8gdlLGc8:ozD7i8ANGZH6RT+L9xaBc8gac8

Malware Config

Targets

    • Target

      3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604

    • Size

      500KB

    • MD5

      55a6f3e924a18d368756c29d582a3e67

    • SHA1

      4e19a9ee30d00f829ca884b0ab9b43e3d6b3f778

    • SHA256

      3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604

    • SHA512

      380c1cd13ce5ceab2db30d2d4a71d4a5315a8b8321dc8928cb33d34ea6aabbaccb9dffa5f783d1fb5ad1aed92701acb5601c1c7e1a419014b394e0cfe44ffa8c

    • SSDEEP

      12288:ozE679I8/ZdkB7qeGvRHHVlXqgGzP+4WvX5nxzpsBc8gdlLGc8:ozD7i8ANGZH6RT+L9xaBc8gac8

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks