General
-
Target
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303
-
Size
352KB
-
Sample
221030-q6r3zadbf4
-
MD5
92df8946d36b23ccb370f188f3a00870
-
SHA1
368ad1a5c349f9ab1356a1754cb3a2743a14e865
-
SHA256
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303
-
SHA512
245ccee63efc2c0b51e57f9cea0ae6bc3f849d956796b5237d248a2243ce70f50d5e333a0ec1bdfafa805ce9861d5bbb149e2cdfd50e0d744c7c4d0b3dbc8784
-
SSDEEP
6144:tnEjTltu6wuisyZDj1T5UAAeGdD6DTzysQt9YgPmG5lXgl7muy:d2tSsmN5UHNI2LjHPmGnXg
Static task
static1
Behavioral task
behavioral1
Sample
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303
-
Size
352KB
-
MD5
92df8946d36b23ccb370f188f3a00870
-
SHA1
368ad1a5c349f9ab1356a1754cb3a2743a14e865
-
SHA256
97ed7939f368f9be51c475d0383079a9e5fbf7b20da3e3274957829356f6d303
-
SHA512
245ccee63efc2c0b51e57f9cea0ae6bc3f849d956796b5237d248a2243ce70f50d5e333a0ec1bdfafa805ce9861d5bbb149e2cdfd50e0d744c7c4d0b3dbc8784
-
SSDEEP
6144:tnEjTltu6wuisyZDj1T5UAAeGdD6DTzysQt9YgPmG5lXgl7muy:d2tSsmN5UHNI2LjHPmGnXg
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-