General

  • Target

    c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3

  • Size

    480KB

  • Sample

    230129-hpyv7aec2v

  • MD5

    84730977d3c5921ce72f06569e0303d7

  • SHA1

    0136a583df02745bdc1bbef21e6bf395a07a87ab

  • SHA256

    c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3

  • SHA512

    9f4b3eecb443f0b7b8cfc30dec73a2e04d639406e6c7c945382173d8bd11d12d28bb9e4888469ea0873e8f0c5b43ec0e9f3b6688afb8242dec451a353aa9e368

  • SSDEEP

    12288:diJu+2t874tMkvsVSKgMG5PJVSiFCtDM:druNMMG5nSiFCtD

Malware Config

Targets

    • Target

      c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3

    • Size

      480KB

    • MD5

      84730977d3c5921ce72f06569e0303d7

    • SHA1

      0136a583df02745bdc1bbef21e6bf395a07a87ab

    • SHA256

      c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3

    • SHA512

      9f4b3eecb443f0b7b8cfc30dec73a2e04d639406e6c7c945382173d8bd11d12d28bb9e4888469ea0873e8f0c5b43ec0e9f3b6688afb8242dec451a353aa9e368

    • SSDEEP

      12288:diJu+2t874tMkvsVSKgMG5PJVSiFCtDM:druNMMG5nSiFCtD

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks