General
-
Target
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b
-
Size
389KB
-
Sample
221013-wdcqgaffbp
-
MD5
7b8ca19e8b7133aa8de06bc67e686330
-
SHA1
f347e1868be50a71042d9498955bc9ce48fef47a
-
SHA256
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b
-
SHA512
b4fd99b080d780d127e9384b52f78e309a4efd38aaa870f8fb52ca896db4c3c12cc581aac11a75ff8de8ddade43dffc76e38b99b8623fbda906bfcb637d6de62
-
SSDEEP
6144:JtEVpyJD+zjjSKDCmSam8xOPC4sOwMrSWtDYR3x0/9Yz1i:JtEVpyJyzjjJ4aBmCQr50uF
Static task
static1
Behavioral task
behavioral1
Sample
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b
-
Size
389KB
-
MD5
7b8ca19e8b7133aa8de06bc67e686330
-
SHA1
f347e1868be50a71042d9498955bc9ce48fef47a
-
SHA256
3e38444ba9e9764335fa316410b7261f1f672e51178b3ce87f3cee7fb60e469b
-
SHA512
b4fd99b080d780d127e9384b52f78e309a4efd38aaa870f8fb52ca896db4c3c12cc581aac11a75ff8de8ddade43dffc76e38b99b8623fbda906bfcb637d6de62
-
SSDEEP
6144:JtEVpyJD+zjjSKDCmSam8xOPC4sOwMrSWtDYR3x0/9Yz1i:JtEVpyJyzjjJ4aBmCQr50uF
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-