General
-
Target
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53
-
Size
1.0MB
-
Sample
221123-zpz7pade24
-
MD5
174505b7760c7282e1a9968b6cba6201
-
SHA1
660ddb36bc89927426411052e0de4d208d084830
-
SHA256
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53
-
SHA512
5ae50f25a3fbbce2e329e9ba0bed2247aa58ed5b2b5102235b69d4575fd041b5bb63ba8d8f0ea73fc958d0ff8b7957382b168df9ed7173a19ad7883183dee62e
-
SSDEEP
12288:VH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QwtQM9wgNaEP5rKtOnrZsWzK:VbCj2sObHtqQ4QM9vNacNK0SQOb/9
Static task
static1
Behavioral task
behavioral1
Sample
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53
-
Size
1.0MB
-
MD5
174505b7760c7282e1a9968b6cba6201
-
SHA1
660ddb36bc89927426411052e0de4d208d084830
-
SHA256
2ab572573b1f3f18d40d629f0a81c5412d065f8cece86afe3479d2c74a83cd53
-
SHA512
5ae50f25a3fbbce2e329e9ba0bed2247aa58ed5b2b5102235b69d4575fd041b5bb63ba8d8f0ea73fc958d0ff8b7957382b168df9ed7173a19ad7883183dee62e
-
SSDEEP
12288:VH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QwtQM9wgNaEP5rKtOnrZsWzK:VbCj2sObHtqQ4QM9vNacNK0SQOb/9
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-