General
-
Target
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d
-
Size
366KB
-
Sample
221106-lha3bsdgf4
-
MD5
1156c47a63e8ac62828e29bd20e6f180
-
SHA1
5e980f9a800a87ea77810605015e062c0fbbcae4
-
SHA256
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d
-
SHA512
879a1577c5da1f14060c4f60e57894e8480187ef2d324d613d99c095a84fe91e14079fe5fb3bc36b0d7f223ce7564b4ee7b9c02ae39f076ac81b171567cb3752
-
SSDEEP
6144:wzlCREOuG5oTWqCPrNeBbVqtDgkmRpf341qMgMbyALQWB3gjrJHPYIwqCo8Le:yoxuZyqCjNeBbMVg1RpfIvg5ALJ3IHPr
Static task
static1
Behavioral task
behavioral1
Sample
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d
-
Size
366KB
-
MD5
1156c47a63e8ac62828e29bd20e6f180
-
SHA1
5e980f9a800a87ea77810605015e062c0fbbcae4
-
SHA256
213a5d73da18ed1b60dbf3328c313b06f207385078fea0c616dbd7fdb59e685d
-
SHA512
879a1577c5da1f14060c4f60e57894e8480187ef2d324d613d99c095a84fe91e14079fe5fb3bc36b0d7f223ce7564b4ee7b9c02ae39f076ac81b171567cb3752
-
SSDEEP
6144:wzlCREOuG5oTWqCPrNeBbVqtDgkmRpf341qMgMbyALQWB3gjrJHPYIwqCo8Le:yoxuZyqCjNeBbMVg1RpfIvg5ALJ3IHPr
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-