General
-
Target
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512
-
Size
385KB
-
Sample
221001-3w2kwadhaj
-
MD5
8d03ddeb4a45cc5cf864f732c098b0b6
-
SHA1
b1e49e2ef7991bbe5dfc659b081eee6d01e6984e
-
SHA256
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512
-
SHA512
1f65903cee3bba83f7729d5beab07302e0d12021343578b85586704e68bf22ffe630bf6d6690ff1be8ff74b3389431a858b90d2093f4e76e42146de694c61594
-
SSDEEP
6144:qb7oxSwhH71/raQi87rDOzpRC/d/+hPH2mdIaWTshmQ2xJ/lyFjP0m:GoxFhh/ramnGpY/dGhPH2+WTeb
Static task
static1
Behavioral task
behavioral1
Sample
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512
-
Size
385KB
-
MD5
8d03ddeb4a45cc5cf864f732c098b0b6
-
SHA1
b1e49e2ef7991bbe5dfc659b081eee6d01e6984e
-
SHA256
4417e1a32e2bd681dd94077a12464d2d27efdc64fa219021fffa1b704eea5512
-
SHA512
1f65903cee3bba83f7729d5beab07302e0d12021343578b85586704e68bf22ffe630bf6d6690ff1be8ff74b3389431a858b90d2093f4e76e42146de694c61594
-
SSDEEP
6144:qb7oxSwhH71/raQi87rDOzpRC/d/+hPH2mdIaWTshmQ2xJ/lyFjP0m:GoxFhh/ramnGpY/dGhPH2+WTeb
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-