General

  • Target

    7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe

  • Size

    962KB

  • Sample

    250202-mgmkeazjdq

  • MD5

    05fef27b342e781baf4afb4a5b62cac3

  • SHA1

    538f859e713439d99efb1491bfbe2c99005e209f

  • SHA256

    7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01

  • SHA512

    b58d6351a7503b330d9cc96926f9e05514f6106fc560cfc89d3ce04cbfa8885394c296798485630b2b61d96c72f2aa3230838e63b33d2b9481876f6267d16435

  • SSDEEP

    24576:Jt24wfvf7a8DPw67oc1xuzoVF5r5QAwFv0XcI:1ef7aD6Ffuw7B2fI

Malware Config

Targets

    • Target

      7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe

    • Size

      962KB

    • MD5

      05fef27b342e781baf4afb4a5b62cac3

    • SHA1

      538f859e713439d99efb1491bfbe2c99005e209f

    • SHA256

      7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01

    • SHA512

      b58d6351a7503b330d9cc96926f9e05514f6106fc560cfc89d3ce04cbfa8885394c296798485630b2b61d96c72f2aa3230838e63b33d2b9481876f6267d16435

    • SSDEEP

      24576:Jt24wfvf7a8DPw67oc1xuzoVF5r5QAwFv0XcI:1ef7aD6Ffuw7B2fI

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Modifies visiblity of hidden/system files in Explorer

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks