General
-
Target
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c
-
Size
340KB
-
Sample
220308-mefzvagdcm
-
MD5
8a4e7a24fc1e0828ed209a7adcd023ea
-
SHA1
a6d749c5a2d019821c7635827ae3a96d29e729d2
-
SHA256
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c
-
SHA512
defe84bb5119e386534b8c894974d4dd68e8fc6b360b7bccad5cb13bb093a91801317363c86017ab7a48bcb4d9d89298d8b7ee105ff10f6bef38418ad31065d9
Static task
static1
Behavioral task
behavioral1
Sample
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c
-
Size
340KB
-
MD5
8a4e7a24fc1e0828ed209a7adcd023ea
-
SHA1
a6d749c5a2d019821c7635827ae3a96d29e729d2
-
SHA256
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c
-
SHA512
defe84bb5119e386534b8c894974d4dd68e8fc6b360b7bccad5cb13bb093a91801317363c86017ab7a48bcb4d9d89298d8b7ee105ff10f6bef38418ad31065d9
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-