Malware Analysis Report

2025-01-18 16:47

Sample ID 220308-wbpx1shhb9
Target 583fb3411a92e6e9c42e2c45a4c4d21c7d0e39e2bc3028c9a4e0f20a3b40d82c
SHA256 583fb3411a92e6e9c42e2c45a4c4d21c7d0e39e2bc3028c9a4e0f20a3b40d82c
Tags
isrstealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

583fb3411a92e6e9c42e2c45a4c4d21c7d0e39e2bc3028c9a4e0f20a3b40d82c

Threat Level: Known bad

The file 583fb3411a92e6e9c42e2c45a4c4d21c7d0e39e2bc3028c9a4e0f20a3b40d82c was found to be: Known bad.

Malicious Activity Summary

isrstealer

ISR Stealer Payload

Isrstealer family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-03-08 17:45

Signatures

ISR Stealer Payload

Description Indicator Process Target
N/A N/A N/A N/A

Isrstealer family

isrstealer

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-08 17:45

Reported

2022-03-08 17:53

Platform

win7-20220223-en

Max time kernel

4294062s

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-08 17:45

Reported

2022-03-08 17:54

Platform

win10v2004-en-20220112

Max time kernel

5s

Max time network

8s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
NL 104.110.191.140:80 tcp
NL 84.53.175.107:80 tcp
US 8.8.8.8:53 udp
N/A 20.190.160.132:443 tcp

Files

N/A