General
-
Target
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45
-
Size
350KB
-
Sample
221001-3tjbhsdfhn
-
MD5
a84c6c2a6a5627b2544b1c831703abd7
-
SHA1
55d98f15ee6f13b9e455238cebadf1e8b105bac3
-
SHA256
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45
-
SHA512
150d07599f05d057c618aa4412e5d343f440264380aefd19b1a1b3b1c37926c932d6b223bdeea9b3a8e8b4a626fe03fc0b8b4cccb23e266d4f45b0c32f8a8569
-
SSDEEP
6144:iQeCfZrhChF1+/j/g27x7XWQP0WPcr/szOXqle2RZiQ:iQBfZgF1+U27x7mQP0rTqOMeg
Static task
static1
Behavioral task
behavioral1
Sample
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45
-
Size
350KB
-
MD5
a84c6c2a6a5627b2544b1c831703abd7
-
SHA1
55d98f15ee6f13b9e455238cebadf1e8b105bac3
-
SHA256
29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45
-
SHA512
150d07599f05d057c618aa4412e5d343f440264380aefd19b1a1b3b1c37926c932d6b223bdeea9b3a8e8b4a626fe03fc0b8b4cccb23e266d4f45b0c32f8a8569
-
SSDEEP
6144:iQeCfZrhChF1+/j/g27x7XWQP0WPcr/szOXqle2RZiQ:iQBfZgF1+U27x7mQP0rTqOMeg
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-