General
-
Target
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88
-
Size
2.0MB
-
Sample
221029-s2l29scfb9
-
MD5
8fb2caac8887a8538ca73db1c29d82e4
-
SHA1
f5e346a81a009cee885fbb49a195b1963e820da4
-
SHA256
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88
-
SHA512
d44cc65ddea17316de8c84e8c90bb6024c66b8f1b3646ae3ec1c68ef5cecf7c4a5210a3a99676e36d3b799d0ec0659f949b3ad01667ecc058897f3a10c2f42c7
-
SSDEEP
49152:FSVaOWFkkkE5Xmw3tZwiopdKIEilfUya2iuFXmUT:FS8bkbEXvjyK18darulm2
Behavioral task
behavioral1
Sample
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88
-
Size
2.0MB
-
MD5
8fb2caac8887a8538ca73db1c29d82e4
-
SHA1
f5e346a81a009cee885fbb49a195b1963e820da4
-
SHA256
ffbef07bb7886bc1d708308a9c28f9ce1344088e842500196654e948f20dbc88
-
SHA512
d44cc65ddea17316de8c84e8c90bb6024c66b8f1b3646ae3ec1c68ef5cecf7c4a5210a3a99676e36d3b799d0ec0659f949b3ad01667ecc058897f3a10c2f42c7
-
SSDEEP
49152:FSVaOWFkkkE5Xmw3tZwiopdKIEilfUya2iuFXmUT:FS8bkbEXvjyK18darulm2
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-