General

  • Target

    e0b8ddf70d7ab115a8bfa5b49f285a5d

  • Size

    440KB

  • Sample

    240327-emv5qsfc8w

  • MD5

    e0b8ddf70d7ab115a8bfa5b49f285a5d

  • SHA1

    dd2df5d6282bf68a0f00192f4b5ddd4e4b3f9e8e

  • SHA256

    0a7d70527905957f57ef2b03eedceb93a55dfc626e6eee86bf9b7b184af1a390

  • SHA512

    7436833565f9e6f9ed6ab99e0bd09b23c573f1eda7841e960e1a7b03babc2d771eda2a8528dd3a85a57dd0f33fd6590a96421db4a052a04064e9cfbe9fcb47d3

  • SSDEEP

    12288:hB8vmtsmWdN+GIs0Bp8gVh+7uiRNpk3GyE:em6Vd8LsiV/GyE

Malware Config

Targets

    • Target

      e0b8ddf70d7ab115a8bfa5b49f285a5d

    • Size

      440KB

    • MD5

      e0b8ddf70d7ab115a8bfa5b49f285a5d

    • SHA1

      dd2df5d6282bf68a0f00192f4b5ddd4e4b3f9e8e

    • SHA256

      0a7d70527905957f57ef2b03eedceb93a55dfc626e6eee86bf9b7b184af1a390

    • SHA512

      7436833565f9e6f9ed6ab99e0bd09b23c573f1eda7841e960e1a7b03babc2d771eda2a8528dd3a85a57dd0f33fd6590a96421db4a052a04064e9cfbe9fcb47d3

    • SSDEEP

      12288:hB8vmtsmWdN+GIs0Bp8gVh+7uiRNpk3GyE:em6Vd8LsiV/GyE

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks