General
-
Target
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84
-
Size
388KB
-
Sample
221021-xq1hqsbfak
-
MD5
7319389085a33d1019201aec235a5550
-
SHA1
f554251589c25e095186b7280c235833fa108111
-
SHA256
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84
-
SHA512
862fc1776660114f67ff31db6f86653e68deed2b47cda22048a48493d122cbf7865a42288b80f607796453613cce8ddda410173afbefac694f79ae83a7091e97
-
SSDEEP
6144:2QuZspwEc5DzHYMPL3QtaTV5WxtXBD7KEynTM/ZZnIr:2QO4uQtiV54jfKEynQ/Z
Static task
static1
Behavioral task
behavioral1
Sample
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84
-
Size
388KB
-
MD5
7319389085a33d1019201aec235a5550
-
SHA1
f554251589c25e095186b7280c235833fa108111
-
SHA256
1c568e553bca8db87be421b3f41c84421266cc7f75c7efdd25c0102f35b68a84
-
SHA512
862fc1776660114f67ff31db6f86653e68deed2b47cda22048a48493d122cbf7865a42288b80f607796453613cce8ddda410173afbefac694f79ae83a7091e97
-
SSDEEP
6144:2QuZspwEc5DzHYMPL3QtaTV5WxtXBD7KEynTM/ZZnIr:2QO4uQtiV54jfKEynQ/Z
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-