General
-
Target
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a
-
Size
474KB
-
Sample
221021-j6saeabadm
-
MD5
591d4b220d8e425034be1aa8d66e5230
-
SHA1
12d004a920d037314444e946e3fed0d9f7f80f01
-
SHA256
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a
-
SHA512
1335a34753ddfc03cc7dee80e336668f9f7ffe53c6336f1b43e7b45c48966847ba625297b981cb8731f8600f265f1921102b4be6dec3e3dbd27e0071f368bc16
-
SSDEEP
12288:mfx/RiZaBvxLEdUumMRVtbnW9CO8m/wre:mfhMQ54dtmMRVtbWz/7
Static task
static1
Behavioral task
behavioral1
Sample
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a
-
Size
474KB
-
MD5
591d4b220d8e425034be1aa8d66e5230
-
SHA1
12d004a920d037314444e946e3fed0d9f7f80f01
-
SHA256
1415af94f7a9b7bdb07bb9c113b025b0b6f6cff5f072baa3735363f16897be4a
-
SHA512
1335a34753ddfc03cc7dee80e336668f9f7ffe53c6336f1b43e7b45c48966847ba625297b981cb8731f8600f265f1921102b4be6dec3e3dbd27e0071f368bc16
-
SSDEEP
12288:mfx/RiZaBvxLEdUumMRVtbnW9CO8m/wre:mfhMQ54dtmMRVtbWz/7
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-