General

  • Target

    PROJECT 1.exe

  • Size

    550KB

  • Sample

    230526-sh44qsga78

  • MD5

    ed52d89af4045fd3aa9fa988b58f20d5

  • SHA1

    a6fb1d7e0ea8a1acae8bf0a2e409c2eba9af3cf4

  • SHA256

    f6bd53e7fe28bb9addafc769a335efcd239f3284d580efbccb6c1b4941c4c317

  • SHA512

    33773471d78d7c248d12ec3e5818e87346a5d6caec3f523567dba7555a60be569811d05c0ccb70e7b80fc61edbf20985c07de5d7fb7aebf4b1559c8e088081b8

  • SSDEEP

    12288:tsMcZwBYZt2GFqvRhzBlP2WRipK1g/rWJSTgTxVVrdB:gZw+tJFqvSqOKonmPVr/

Malware Config

Targets

    • Target

      PROJECT 1.exe

    • Size

      550KB

    • MD5

      ed52d89af4045fd3aa9fa988b58f20d5

    • SHA1

      a6fb1d7e0ea8a1acae8bf0a2e409c2eba9af3cf4

    • SHA256

      f6bd53e7fe28bb9addafc769a335efcd239f3284d580efbccb6c1b4941c4c317

    • SHA512

      33773471d78d7c248d12ec3e5818e87346a5d6caec3f523567dba7555a60be569811d05c0ccb70e7b80fc61edbf20985c07de5d7fb7aebf4b1559c8e088081b8

    • SSDEEP

      12288:tsMcZwBYZt2GFqvRhzBlP2WRipK1g/rWJSTgTxVVrdB:gZw+tJFqvSqOKonmPVr/

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks