General
-
Target
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b
-
Size
340KB
-
Sample
221001-3wqtdacef4
-
MD5
dfe4a1cd1e822fba707b9d20017d0084
-
SHA1
e273c86578c9207b08c5d0517438cef0677a0330
-
SHA256
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b
-
SHA512
7e57b2e54741952da97c0c82631aba1a16dcbc797ff8500b3ae0f4d431e2d73ba742fb41378a3e61cafc96829a3c1a37be7c339780ed640d3c5eb6c5bce62c49
-
SSDEEP
6144:PXUQPN4gKo6iLoHIZvHPfrDW/MAfxitOW3IVhoOtmKWJVSFS1/uLJI:PigKoBcHWry/bjI2IVu
Static task
static1
Behavioral task
behavioral1
Sample
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b
-
Size
340KB
-
MD5
dfe4a1cd1e822fba707b9d20017d0084
-
SHA1
e273c86578c9207b08c5d0517438cef0677a0330
-
SHA256
cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b
-
SHA512
7e57b2e54741952da97c0c82631aba1a16dcbc797ff8500b3ae0f4d431e2d73ba742fb41378a3e61cafc96829a3c1a37be7c339780ed640d3c5eb6c5bce62c49
-
SSDEEP
6144:PXUQPN4gKo6iLoHIZvHPfrDW/MAfxitOW3IVhoOtmKWJVSFS1/uLJI:PigKoBcHWry/bjI2IVu
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-