General

  • Target

    dc35c41440704458ed7a60c0ac026f62

  • Size

    408KB

  • Sample

    231228-nrb24abhb6

  • MD5

    dc35c41440704458ed7a60c0ac026f62

  • SHA1

    28459a2a602943fb5f44cb7424061c390fefb502

  • SHA256

    4d4e7a37101a9fa0810a3ff324a87c302a1328dcaeae6a9c637752e871a1a678

  • SHA512

    f522adf75f7915caf3a87551f4704303ddde487da920c6a2a762d4fc821f5c6749b2496cdd5b5193252eb97f01cdcc3dc77584be90e6833e32f2410b955f8081

  • SSDEEP

    6144:v7l/Mts0sXrneChRWcSUEC8ctAom2C+do4ON1ZA0bYQpBuLGlY+6iPHS/ei:hMSeChscpEBctA2Q11aPQ3/6/ei

Malware Config

Targets

    • Target

      dc35c41440704458ed7a60c0ac026f62

    • Size

      408KB

    • MD5

      dc35c41440704458ed7a60c0ac026f62

    • SHA1

      28459a2a602943fb5f44cb7424061c390fefb502

    • SHA256

      4d4e7a37101a9fa0810a3ff324a87c302a1328dcaeae6a9c637752e871a1a678

    • SHA512

      f522adf75f7915caf3a87551f4704303ddde487da920c6a2a762d4fc821f5c6749b2496cdd5b5193252eb97f01cdcc3dc77584be90e6833e32f2410b955f8081

    • SSDEEP

      6144:v7l/Mts0sXrneChRWcSUEC8ctAom2C+do4ON1ZA0bYQpBuLGlY+6iPHS/ei:hMSeChscpEBctA2Q11aPQ3/6/ei

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks