General
-
Target
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484
-
Size
340KB
-
Sample
220308-vk2shahdd2
-
MD5
bb63a9a8be7756b02e2706a967bef3f6
-
SHA1
0e30c97d88fc84758b0ad097a4c3c1cf011d03f6
-
SHA256
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484
-
SHA512
4e838c9e9bfc8bd288970d3860b919b01ba52376717beff6b3ade6dddd2af77dc8a450a36bd3d9f6e9ab084b4f727e47305e6ac45da54a5f32f3ed5507e20d42
Static task
static1
Behavioral task
behavioral1
Sample
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484
-
Size
340KB
-
MD5
bb63a9a8be7756b02e2706a967bef3f6
-
SHA1
0e30c97d88fc84758b0ad097a4c3c1cf011d03f6
-
SHA256
620222355eb493bacfc0409b4704af8c253ade0142844093f5c541c69f4c9484
-
SHA512
4e838c9e9bfc8bd288970d3860b919b01ba52376717beff6b3ade6dddd2af77dc8a450a36bd3d9f6e9ab084b4f727e47305e6ac45da54a5f32f3ed5507e20d42
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-