General
-
Target
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6
-
Size
1013KB
-
Sample
221121-3gl7mseh5x
-
MD5
729d6040af9af63c748491a3f0b597fb
-
SHA1
f8b7ac08d14581cc35770a34ba49aa273b6ff659
-
SHA256
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6
-
SHA512
b5c9ddf44e268d7bd4cc690ef83e5c4ffdbb2ba90a391a73373ba48735a608747581d84c365bf644d3a2a38a6280ae93c376779822dc83fbab496f80700acb09
-
SSDEEP
12288:RaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QQOJZri9oGE15jSsFZyoopMXnyTWn:AaHMv6Corjqny/QJJtkoRNFZyoRnyin
Static task
static1
Behavioral task
behavioral1
Sample
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6
-
Size
1013KB
-
MD5
729d6040af9af63c748491a3f0b597fb
-
SHA1
f8b7ac08d14581cc35770a34ba49aa273b6ff659
-
SHA256
20f64afe66e77dbfea66194478ed94c27ddae050fbdd0344900bedc027846cb6
-
SHA512
b5c9ddf44e268d7bd4cc690ef83e5c4ffdbb2ba90a391a73373ba48735a608747581d84c365bf644d3a2a38a6280ae93c376779822dc83fbab496f80700acb09
-
SSDEEP
12288:RaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QQOJZri9oGE15jSsFZyoopMXnyTWn:AaHMv6Corjqny/QJJtkoRNFZyoRnyin
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-