General
-
Target
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391
-
Size
1.1MB
-
Sample
221020-ld13ysfef6
-
MD5
816cc4d38afcf2792be067bb64637ed9
-
SHA1
9d87f8340eec6469c9bdc25a6cac29e6cb5add93
-
SHA256
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391
-
SHA512
5bb37ec318842ab1705bf7c46b66aaed60e5443da1ab50ad48cf328cd7f45793598a8f964c7930bc64e4fbc8fa698a9fcc0018ad81637555da8fa0b0dd7b63e3
-
SSDEEP
24576:GV+yqaLs4zzaWWc5cxAN+ENr6XovJIYKC19:YZLjphccM4vJvjP
Static task
static1
Behavioral task
behavioral1
Sample
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391
-
Size
1.1MB
-
MD5
816cc4d38afcf2792be067bb64637ed9
-
SHA1
9d87f8340eec6469c9bdc25a6cac29e6cb5add93
-
SHA256
25f44adf8ceec3f90e02a02178fc377e26cda8c88293c6b9c5d27e5ac47c7391
-
SHA512
5bb37ec318842ab1705bf7c46b66aaed60e5443da1ab50ad48cf328cd7f45793598a8f964c7930bc64e4fbc8fa698a9fcc0018ad81637555da8fa0b0dd7b63e3
-
SSDEEP
24576:GV+yqaLs4zzaWWc5cxAN+ENr6XovJIYKC19:YZLjphccM4vJvjP
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-