General
-
Target
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59
-
Size
285KB
-
Sample
221020-y7brdadde7
-
MD5
904668932587d7dc853bea92906980b3
-
SHA1
287ebd3a54f7f4a44588c3ac3e9da8758f621cb9
-
SHA256
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59
-
SHA512
5bc3a49d3018764922dd934c2a0045c13ab98bb197cc6075d07ddd819cc04dcf63bc7268f0cd58f022db87f7f5d662a398ca6e2120357ecf9db12cfcd8347a78
-
SSDEEP
6144:NpxIRFvpEihGQ70xENDb6VWSm3YFd/F5UB3COFslRx3EDlqx87QVv/vTf42340:nqRNwnENP6VW+FhvUBSvlR6Dle8M3rfl
Static task
static1
Behavioral task
behavioral1
Sample
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59
-
Size
285KB
-
MD5
904668932587d7dc853bea92906980b3
-
SHA1
287ebd3a54f7f4a44588c3ac3e9da8758f621cb9
-
SHA256
3e0fe0b4ebcb8a1f803b47bed8129987630c7ed559cd21e288a2b2c4ee5d5c59
-
SHA512
5bc3a49d3018764922dd934c2a0045c13ab98bb197cc6075d07ddd819cc04dcf63bc7268f0cd58f022db87f7f5d662a398ca6e2120357ecf9db12cfcd8347a78
-
SSDEEP
6144:NpxIRFvpEihGQ70xENDb6VWSm3YFd/F5UB3COFslRx3EDlqx87QVv/vTf42340:nqRNwnENP6VW+FhvUBSvlR6Dle8M3rfl
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-