General
-
Target
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b
-
Size
1.2MB
-
Sample
221123-rjsawsbg5z
-
MD5
fe5175560342c0936f33072bc5f125c2
-
SHA1
12f3bb5a0822e8317cf0444a215322f5bed9e6dd
-
SHA256
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b
-
SHA512
8ae02d9e6e44db218f99e84b6b945d228646ea4bb5e1dae5621d03f1a09a043e729723dbb1ee463a4ce15507d1cd21f30f64ebd1a09ef4266fa770fd78c0960d
-
SSDEEP
24576:di4FmmfgFuk/3OtOZHcgxW7NbQkGt4ST69cv20euBXaXlSJitbxSrYFnDzh/hvEe:di4FmmfgUk/etOZHcgY7NbQkGqST69w+
Static task
static1
Behavioral task
behavioral1
Sample
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b
-
Size
1.2MB
-
MD5
fe5175560342c0936f33072bc5f125c2
-
SHA1
12f3bb5a0822e8317cf0444a215322f5bed9e6dd
-
SHA256
5b72ca62dd81f1419b3b7598c96160c19d124fe6ec657d0d35f55795a467e35b
-
SHA512
8ae02d9e6e44db218f99e84b6b945d228646ea4bb5e1dae5621d03f1a09a043e729723dbb1ee463a4ce15507d1cd21f30f64ebd1a09ef4266fa770fd78c0960d
-
SSDEEP
24576:di4FmmfgFuk/3OtOZHcgxW7NbQkGt4ST69cv20euBXaXlSJitbxSrYFnDzh/hvEe:di4FmmfgUk/etOZHcgY7NbQkGqST69w+
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-