General
-
Target
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c
-
Size
1.1MB
-
Sample
221124-e6fjdshd53
-
MD5
11c20f0a2f97d615cb9ddd634c04086d
-
SHA1
9296c3f962e8078fd9fbfa775a688995d0fd9e25
-
SHA256
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c
-
SHA512
57fb963592fe1f2d0fea3aeb5d93cccbdc61136cdf3b8e37fab362ce782493043f974216ade6b807a86e50e431194859768afcdf367a448ad8e3c9bc1dc1ea52
-
SSDEEP
12288:zH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8Q66oIWr69oGE15jSsFZyoop3:zbCj2sObHtqQ4Q66DssoRNFZyopgX
Static task
static1
Behavioral task
behavioral1
Sample
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c
-
Size
1.1MB
-
MD5
11c20f0a2f97d615cb9ddd634c04086d
-
SHA1
9296c3f962e8078fd9fbfa775a688995d0fd9e25
-
SHA256
fa2c2a36f73c98508cf406f012a6a2217e4611fb2d22e1ee01998abd2fb2396c
-
SHA512
57fb963592fe1f2d0fea3aeb5d93cccbdc61136cdf3b8e37fab362ce782493043f974216ade6b807a86e50e431194859768afcdf367a448ad8e3c9bc1dc1ea52
-
SSDEEP
12288:zH7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8Q66oIWr69oGE15jSsFZyoop3:zbCj2sObHtqQ4Q66DssoRNFZyopgX
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-