General

  • Target

    3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN

  • Size

    4.8MB

  • Sample

    240929-2mw4csteqj

  • MD5

    f62e712524cf372a41e60689829ce5e0

  • SHA1

    6c55af73c51e5737d7345a7736f8d2339b6bc07a

  • SHA256

    3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53c

  • SHA512

    4333a5d4f50ceb0fe937cb362e45df30010da3faeef33fab290182df0ae0ae0b0f30504591de4d375437bc1fbfe45acaf657d2b0ee81847c0a46c8f9de65dfd0

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN

    • Size

      4.8MB

    • MD5

      f62e712524cf372a41e60689829ce5e0

    • SHA1

      6c55af73c51e5737d7345a7736f8d2339b6bc07a

    • SHA256

      3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53c

    • SHA512

      4333a5d4f50ceb0fe937cb362e45df30010da3faeef33fab290182df0ae0ae0b0f30504591de4d375437bc1fbfe45acaf657d2b0ee81847c0a46c8f9de65dfd0

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks