General

  • Target

    8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe

  • Size

    527KB

  • Sample

    241216-g9ga7szldj

  • MD5

    9078ea88145489ae166ec9c534000ff0

  • SHA1

    3d84ed1e46534edc57b260f81e0dc5afacc78d6a

  • SHA256

    8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373c

  • SHA512

    f22e2e8b4448d3aa827d2f264ad02d591980209d411a432e0da1b7253b6bc6ff93ba17a8e72ddc6acdf48e128902d1ce78d829684c957e30ce3a47f5a9fbb450

  • SSDEEP

    12288:QYBzgc7Bs/4DeYYzYBzgc783y84CGtjnVB5ONbs9Qj:QUgc7e/4jYzUgc78RQXBQhj

Malware Config

Targets

    • Target

      8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373cN.exe

    • Size

      527KB

    • MD5

      9078ea88145489ae166ec9c534000ff0

    • SHA1

      3d84ed1e46534edc57b260f81e0dc5afacc78d6a

    • SHA256

      8429d738392a7baf7d4fe289c560dfa3233169dd234d9885452c81691b39373c

    • SHA512

      f22e2e8b4448d3aa827d2f264ad02d591980209d411a432e0da1b7253b6bc6ff93ba17a8e72ddc6acdf48e128902d1ce78d829684c957e30ce3a47f5a9fbb450

    • SSDEEP

      12288:QYBzgc7Bs/4DeYYzYBzgc783y84CGtjnVB5ONbs9Qj:QUgc7e/4jYzUgc78RQXBQhj

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks