General

  • Target

    572b0a1dc3f6452bd60bc4c2271fa972

  • Size

    264KB

  • Sample

    240112-wzmgssdgg3

  • MD5

    572b0a1dc3f6452bd60bc4c2271fa972

  • SHA1

    f4560af2b524b8a1fd4d6196187ad38d4aa28b39

  • SHA256

    61ba14e415c7c25cb55814c83b8921907c3d0cb24fe8ebe4e2d79d1d7f9f0ded

  • SHA512

    e3c4d319d34a586578155948722c0403c5a42e9a7e32fddd82e3733653ba587bc8df9012eb322bf3946ad83b561a275b5b0686abce543efaa6a94e4a6ef022eb

  • SSDEEP

    6144:PlC7pFKGULN4W420m8nCBozjrSPq0jGJxKZuW:spUNO20m8nCBTd

Malware Config

Targets

    • Target

      572b0a1dc3f6452bd60bc4c2271fa972

    • Size

      264KB

    • MD5

      572b0a1dc3f6452bd60bc4c2271fa972

    • SHA1

      f4560af2b524b8a1fd4d6196187ad38d4aa28b39

    • SHA256

      61ba14e415c7c25cb55814c83b8921907c3d0cb24fe8ebe4e2d79d1d7f9f0ded

    • SHA512

      e3c4d319d34a586578155948722c0403c5a42e9a7e32fddd82e3733653ba587bc8df9012eb322bf3946ad83b561a275b5b0686abce543efaa6a94e4a6ef022eb

    • SSDEEP

      6144:PlC7pFKGULN4W420m8nCBozjrSPq0jGJxKZuW:spUNO20m8nCBTd

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks