General
-
Target
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57
-
Size
446KB
-
Sample
221119-lrlv7aad9y
-
MD5
d64d05f5c5b596dbcc33d1c3c29bba36
-
SHA1
f7224d9219f091fcb9f44e5f6d7a39f1703e56ac
-
SHA256
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57
-
SHA512
f935140f11d9d39f60325210472c986a6c3b9eb789124fc6e07a8b394e09726677d7b6220999030bc11dae7d823d5e871c68d0eb0a3e50996514fc7caa943e1d
-
SSDEEP
6144:F0c0T3+690+0yN5qnv/h4kZuNbdbCCqvN7VHD89QfulHHHvv8:F0c0K6K3SigBbCxN7VHD8yfu
Static task
static1
Behavioral task
behavioral1
Sample
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57
-
Size
446KB
-
MD5
d64d05f5c5b596dbcc33d1c3c29bba36
-
SHA1
f7224d9219f091fcb9f44e5f6d7a39f1703e56ac
-
SHA256
7cb4234c1fe1bca713470e7d9525be010dce9c8fcb6b1aa768251314b8f49c57
-
SHA512
f935140f11d9d39f60325210472c986a6c3b9eb789124fc6e07a8b394e09726677d7b6220999030bc11dae7d823d5e871c68d0eb0a3e50996514fc7caa943e1d
-
SSDEEP
6144:F0c0T3+690+0yN5qnv/h4kZuNbdbCCqvN7VHD89QfulHHHvv8:F0c0K6K3SigBbCxN7VHD8yfu
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-