Resubmissions

11-05-2023 15:03

230511-se64xsga3z 10

29-01-2023 12:05

230129-n9m73seb74 10

General

  • Target

    a30731a0007f106e4a12709ae7f5f4de133b20de59de10cd86b211d216779dbe

  • Size

    121KB

  • Sample

    230129-n9m73seb74

  • MD5

    8b6ee5274dca9075af87729fcad6c0f7

  • SHA1

    a794785786d904390533f6a909715060fbb77286

  • SHA256

    a30731a0007f106e4a12709ae7f5f4de133b20de59de10cd86b211d216779dbe

  • SHA512

    112568d672a387e6977bc9e1b7c9a898685abdf841b01e4d2d39aa4942b739151d316032291298b4ecf7fd572232963243f10dbde0e99a884cc12d1d514c851a

  • SSDEEP

    1536:+m1FG8XzZpMlOSYJFBewurwYwn66LpSfQUV7Wtr4G6kBUkGS4Je5Q/yKRyPsIGvl:7QWuNY0rc6ESUU5S4Je5EyKR+sIG/l

Malware Config

Targets

    • Target

      a30731a0007f106e4a12709ae7f5f4de133b20de59de10cd86b211d216779dbe

    • Size

      121KB

    • MD5

      8b6ee5274dca9075af87729fcad6c0f7

    • SHA1

      a794785786d904390533f6a909715060fbb77286

    • SHA256

      a30731a0007f106e4a12709ae7f5f4de133b20de59de10cd86b211d216779dbe

    • SHA512

      112568d672a387e6977bc9e1b7c9a898685abdf841b01e4d2d39aa4942b739151d316032291298b4ecf7fd572232963243f10dbde0e99a884cc12d1d514c851a

    • SSDEEP

      1536:+m1FG8XzZpMlOSYJFBewurwYwn66LpSfQUV7Wtr4G6kBUkGS4Je5Q/yKRyPsIGvl:7QWuNY0rc6ESUU5S4Je5EyKR+sIG/l

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks