General
-
Target
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97
-
Size
1.6MB
-
Sample
221123-w37bdadf88
-
MD5
0a3ff2c1b148fd57970e6af501198a81
-
SHA1
d1c0e41b5f5c9f6fabd2b688bf75d98d9a4651f1
-
SHA256
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97
-
SHA512
5ffe09d9c945aeaef08129eadf4f6c90772fac98650d7b942b40218d2d0612561c9a46720626cc6b8368440d19804e1b5769086cd9073e76845217be1c5346db
-
SSDEEP
49152:tJZoQrbTFZY1ia9GAWcgOjlhSWc3ktXPsJ:ttrbTA1Pjjm/kiJ
Static task
static1
Behavioral task
behavioral1
Sample
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97
-
Size
1.6MB
-
MD5
0a3ff2c1b148fd57970e6af501198a81
-
SHA1
d1c0e41b5f5c9f6fabd2b688bf75d98d9a4651f1
-
SHA256
0078c46b32cef9697b003f8ed2e195a76073d60033bda5fb0fac598431567c97
-
SHA512
5ffe09d9c945aeaef08129eadf4f6c90772fac98650d7b942b40218d2d0612561c9a46720626cc6b8368440d19804e1b5769086cd9073e76845217be1c5346db
-
SSDEEP
49152:tJZoQrbTFZY1ia9GAWcgOjlhSWc3ktXPsJ:ttrbTA1Pjjm/kiJ
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-