General

  • Target

    NEAS.b1b7840a85f47492bd18a14f259271c0.exe

  • Size

    487KB

  • Sample

    231108-b3mlrabe4t

  • MD5

    b1b7840a85f47492bd18a14f259271c0

  • SHA1

    2e4857ca0af00740f2b592eb06607821cef8ecf0

  • SHA256

    b069c79498e11412e2b2725479aee383a1a785c8f2bc32e6bcb0fd78de51f5dc

  • SHA512

    9096bb99397ed9dc7c7fb5118c85e06b80ad7c3b1c1da9b5dbf82446f1f3f37af8bf4638a7b062b16b31a32a113277f94641602c279d702f96acc8983ffef07a

  • SSDEEP

    12288:Pz9ruEtMylb/u7nZxFRD8q4hU0IJDqNC5eR:1uEthl0nRpV0+qN

Malware Config

Targets

    • Target

      NEAS.b1b7840a85f47492bd18a14f259271c0.exe

    • Size

      487KB

    • MD5

      b1b7840a85f47492bd18a14f259271c0

    • SHA1

      2e4857ca0af00740f2b592eb06607821cef8ecf0

    • SHA256

      b069c79498e11412e2b2725479aee383a1a785c8f2bc32e6bcb0fd78de51f5dc

    • SHA512

      9096bb99397ed9dc7c7fb5118c85e06b80ad7c3b1c1da9b5dbf82446f1f3f37af8bf4638a7b062b16b31a32a113277f94641602c279d702f96acc8983ffef07a

    • SSDEEP

      12288:Pz9ruEtMylb/u7nZxFRD8q4hU0IJDqNC5eR:1uEthl0nRpV0+qN

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks