General
-
Target
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
Size
357KB
-
Sample
221123-qyrggafb82
-
MD5
bf4fe8d5d9c1eb3025af8d7a751d9c40
-
SHA1
0dc50e178debf85f7e003eb8ead837514ee88a37
-
SHA256
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
SHA512
9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9
-
SSDEEP
6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5
Static task
static1
Behavioral task
behavioral1
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
Size
357KB
-
MD5
bf4fe8d5d9c1eb3025af8d7a751d9c40
-
SHA1
0dc50e178debf85f7e003eb8ead837514ee88a37
-
SHA256
9081ed87c8ee12275421cd90edd76ea4aca0daaab8a88441468c4e3f97afd278
-
SHA512
9735cd0a6c22050b055e9dca4005d900664bc58d51cd4b7af5666e8c4b9efc71de7896a1f85ceceb362a6fb6eb0ed776d1a888d47a52ecca4fc7722c8a5137c9
-
SSDEEP
6144:9120bYng+O40hQTyYVa8ySLSY/wNfDM/H2wVkE5IYAzgo0pKTsuPQ47gXiCKxbWM:P5YgZH2ja8njP2wVkEhMQKTsL5
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-