General
-
Target
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227
-
Size
402KB
-
Sample
221125-vlfawsbh45
-
MD5
21838131e312ccc1629fbb4581f211fa
-
SHA1
7f32c6f2900f5427c84cc00377ed6e04183b156c
-
SHA256
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227
-
SHA512
20eb5ee491241d8b6d15d2c0b971a5938c7e5f4b37a87ae980a3f26c77fd4061f335f9c88fc824cb398a18ddccd7a2225468effc3f4b496c0addbe32f90a9a88
-
SSDEEP
6144:VNzK2WpGt4j/5MeXF4RaQWiZULy75ad99XHgFswLtiJV35XU36OvelMjqZ:VRKrueMe+RrW9hWiJVFUKOGlMjqZ
Static task
static1
Behavioral task
behavioral1
Sample
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227
-
Size
402KB
-
MD5
21838131e312ccc1629fbb4581f211fa
-
SHA1
7f32c6f2900f5427c84cc00377ed6e04183b156c
-
SHA256
f2a5982ba901ace217b1592d80dbde04b029d14f47404525c7b8696a23b0e227
-
SHA512
20eb5ee491241d8b6d15d2c0b971a5938c7e5f4b37a87ae980a3f26c77fd4061f335f9c88fc824cb398a18ddccd7a2225468effc3f4b496c0addbe32f90a9a88
-
SSDEEP
6144:VNzK2WpGt4j/5MeXF4RaQWiZULy75ad99XHgFswLtiJV35XU36OvelMjqZ:VRKrueMe+RrW9hWiJVFUKOGlMjqZ
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-