General
-
Target
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f
-
Size
405KB
-
Sample
221120-mwv54add8y
-
MD5
3a9ccc8c2e136158792d8f7fd20c88ef
-
SHA1
c8d1514ebefae81e891a87deb18402dad7808b19
-
SHA256
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f
-
SHA512
54bdcff52ba044988ae5717b55866c167b29af3b24453b54aae1638ff5749948aa3f1e5c628e3e91cedb9cfc475d1a4c991230a07a3081998d95d047f05743c5
-
SSDEEP
12288:GdDlk4F3y0DTHY3DQn2T0uBVYrsHSFGZl3QWyThAc43Oww:GdDlk4F3yITHY3DQn2TdTASSkl3QWyTt
Static task
static1
Behavioral task
behavioral1
Sample
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f
-
Size
405KB
-
MD5
3a9ccc8c2e136158792d8f7fd20c88ef
-
SHA1
c8d1514ebefae81e891a87deb18402dad7808b19
-
SHA256
96c3c4f9a3f44b9e143e5a21d6b23b1e57c899e3b24c8fdad00e307762fbc89f
-
SHA512
54bdcff52ba044988ae5717b55866c167b29af3b24453b54aae1638ff5749948aa3f1e5c628e3e91cedb9cfc475d1a4c991230a07a3081998d95d047f05743c5
-
SSDEEP
12288:GdDlk4F3y0DTHY3DQn2T0uBVYrsHSFGZl3QWyThAc43Oww:GdDlk4F3yITHY3DQn2TdTASSkl3QWyTt
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-