General
-
Target
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a
-
Size
927KB
-
Sample
221021-x2arfsbhc4
-
MD5
1962ce13ac71c84d534ad8b86ca46f00
-
SHA1
3b82231a7c0f05cdbb752fdb3f129312c59f22f4
-
SHA256
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a
-
SHA512
c35d7a7f18831df895f16ef39ced6d3cf3e9c1d2794b87ace23a126aa19529e3d63f1b552ecf54abfff134b30bdd28698860edb7f373435442c32052a0075c32
-
SSDEEP
24576:1t24y3ALMhl5B2AqdJ2Ou68GGUEtsh7N1v:hw3TqdJy68OXv
Static task
static1
Behavioral task
behavioral1
Sample
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a
-
Size
927KB
-
MD5
1962ce13ac71c84d534ad8b86ca46f00
-
SHA1
3b82231a7c0f05cdbb752fdb3f129312c59f22f4
-
SHA256
1dad7cebdc748546b37479bb73b8f1e14d80ec924872a70f38600e9de96c709a
-
SHA512
c35d7a7f18831df895f16ef39ced6d3cf3e9c1d2794b87ace23a126aa19529e3d63f1b552ecf54abfff134b30bdd28698860edb7f373435442c32052a0075c32
-
SSDEEP
24576:1t24y3ALMhl5B2AqdJ2Ou68GGUEtsh7N1v:hw3TqdJy68OXv
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-