General

  • Target

    37b1c273a335253d2b417d957157fd0b

  • Size

    228KB

  • Sample

    231225-x4mtsscdc9

  • MD5

    37b1c273a335253d2b417d957157fd0b

  • SHA1

    76d45899889a817e70da1e7e860e1fcc92466beb

  • SHA256

    6ec666b625d998be056ef6a06cef4b0acd2b4ac3388fc8d6c0203fe38beddb23

  • SHA512

    cbebd70bd5913e46bf735e7c71830467abb7dfa7c4c16f1b50bc1713db763b494a2948be3e1a74a4f21e39e45ad7da9acb34e850444708b9b367d10038efef2b

  • SSDEEP

    3072:MYRPRvEagxL0du9VoWNDfAiD3iUZ2t6Yht1w9rI9M+mSIZ24dhLjNk0hTE0Ntgte:M8EjiWN10ht1wu9LK7JjaKT38hu19

Malware Config

Targets

    • Target

      37b1c273a335253d2b417d957157fd0b

    • Size

      228KB

    • MD5

      37b1c273a335253d2b417d957157fd0b

    • SHA1

      76d45899889a817e70da1e7e860e1fcc92466beb

    • SHA256

      6ec666b625d998be056ef6a06cef4b0acd2b4ac3388fc8d6c0203fe38beddb23

    • SHA512

      cbebd70bd5913e46bf735e7c71830467abb7dfa7c4c16f1b50bc1713db763b494a2948be3e1a74a4f21e39e45ad7da9acb34e850444708b9b367d10038efef2b

    • SSDEEP

      3072:MYRPRvEagxL0du9VoWNDfAiD3iUZ2t6Yht1w9rI9M+mSIZ24dhLjNk0hTE0Ntgte:M8EjiWN10ht1wu9LK7JjaKT38hu19

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks