General
-
Target
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c
-
Size
953KB
-
Sample
221014-ckswgscdap
-
MD5
5ed705a5806ff30357438889fc817d50
-
SHA1
975a660296cd4da150ece48e5643954cf9790dcb
-
SHA256
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c
-
SHA512
10d608c29fcf2e9347484c30f09f3b987a35ef687813ba35fde0c3c2bbdaaae79a049b855a38516d1b9c052d8923fb17623022da84a6d63d7dc4d09a010dca67
-
SSDEEP
24576:KRmJkcoQricOIQxiZY1iadCQwpqBJ3cyU9nF1KY:PJZoQrbTFZY1iadCn6J3cyqnF1z
Static task
static1
Behavioral task
behavioral1
Sample
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c
-
Size
953KB
-
MD5
5ed705a5806ff30357438889fc817d50
-
SHA1
975a660296cd4da150ece48e5643954cf9790dcb
-
SHA256
5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c
-
SHA512
10d608c29fcf2e9347484c30f09f3b987a35ef687813ba35fde0c3c2bbdaaae79a049b855a38516d1b9c052d8923fb17623022da84a6d63d7dc4d09a010dca67
-
SSDEEP
24576:KRmJkcoQricOIQxiZY1iadCQwpqBJ3cyU9nF1KY:PJZoQrbTFZY1iadCn6J3cyqnF1z
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-