General
-
Target
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6
-
Size
1.2MB
-
Sample
220616-hwbz1aage9
-
MD5
75e1d7d18b37a47f384bcf4ed05ebfd6
-
SHA1
8fe244eab3110ac69fd87173de07e62c80fa8dae
-
SHA256
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6
-
SHA512
34ff9c146e0f88e8b8e88d515f1d1eb7c5fd336a6aa2f111a9fcdf693c520d4287951f1c1b9f55e94bfad92abeb685c495040a60e5a60ec47fda8793e307c661
Static task
static1
Behavioral task
behavioral1
Sample
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6
-
Size
1.2MB
-
MD5
75e1d7d18b37a47f384bcf4ed05ebfd6
-
SHA1
8fe244eab3110ac69fd87173de07e62c80fa8dae
-
SHA256
26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6
-
SHA512
34ff9c146e0f88e8b8e88d515f1d1eb7c5fd336a6aa2f111a9fcdf693c520d4287951f1c1b9f55e94bfad92abeb685c495040a60e5a60ec47fda8793e307c661
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-