General
-
Target
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618
-
Size
350KB
-
Sample
221002-n3n6ssfdcp
-
MD5
6cd01c6c456e2831ecdafb575d783c4d
-
SHA1
4164244dcda6811f4ad239ab139f00b11381a031
-
SHA256
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618
-
SHA512
4c9e50090121f60d1fd4e19c2910a0d3c6c59364b642345e76f53fd2250316e1c6fedc3898715c97123e02c46f64689556665c775385c2cdc10f9ab6c0a82039
-
SSDEEP
6144:jwUSAb47OeNfJxOUwGjDkTk5y0H/1xqjlkKQb1UYcDtZsbR7f1PiIfPd:jpbx2zjDkAYM/1olkZKYchCbN8Wd
Static task
static1
Behavioral task
behavioral1
Sample
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618
-
Size
350KB
-
MD5
6cd01c6c456e2831ecdafb575d783c4d
-
SHA1
4164244dcda6811f4ad239ab139f00b11381a031
-
SHA256
ea00bfb017bd00a331d033863bc4f81c626ba96668beaea703172aa4edefa618
-
SHA512
4c9e50090121f60d1fd4e19c2910a0d3c6c59364b642345e76f53fd2250316e1c6fedc3898715c97123e02c46f64689556665c775385c2cdc10f9ab6c0a82039
-
SSDEEP
6144:jwUSAb47OeNfJxOUwGjDkTk5y0H/1xqjlkKQb1UYcDtZsbR7f1PiIfPd:jpbx2zjDkAYM/1olkZKYchCbN8Wd
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-