General

  • Target

    8ed0a912c2804f163918c6f99a5f3f85

  • Size

    284KB

  • Sample

    240204-lky7yaech8

  • MD5

    8ed0a912c2804f163918c6f99a5f3f85

  • SHA1

    55115fed0538e4f5c71a7c669c0e0ccbc1edf262

  • SHA256

    b14bdd109476eaa953a82b4b84b986c51f0a54b191456a2fade24440e290949b

  • SHA512

    9dc420a843031d6d8c493f55e5d2240291b838f5490c680591371baeb250165aa89559cd1d2cad6d52523ce29dcdd674a881bff93f4d2741d49d91c564a47063

  • SSDEEP

    6144:b9g7tPq72R2PkhgulFe7H8qDSJ12PYOCpGG+:S7txcMCulF0VDSvMOAG

Malware Config

Targets

    • Target

      8ed0a912c2804f163918c6f99a5f3f85

    • Size

      284KB

    • MD5

      8ed0a912c2804f163918c6f99a5f3f85

    • SHA1

      55115fed0538e4f5c71a7c669c0e0ccbc1edf262

    • SHA256

      b14bdd109476eaa953a82b4b84b986c51f0a54b191456a2fade24440e290949b

    • SHA512

      9dc420a843031d6d8c493f55e5d2240291b838f5490c680591371baeb250165aa89559cd1d2cad6d52523ce29dcdd674a881bff93f4d2741d49d91c564a47063

    • SSDEEP

      6144:b9g7tPq72R2PkhgulFe7H8qDSJ12PYOCpGG+:S7txcMCulF0VDSvMOAG

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks