General
-
Target
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7
-
Size
377KB
-
Sample
221126-abxf7sbe3x
-
MD5
388ceb608b170c58c29f10ddeeb3c9f3
-
SHA1
24edfd36e667f0ba3fc56a7b3113691bd62ddf68
-
SHA256
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7
-
SHA512
72f89e463ef5fb0d73729095f0bf9206b693b82245973ae98491d73a8a5d01c91463504cc27ea1acdddac9b17177da3da4f9e8b1d5acf02e6f20e47948ed40d8
-
SSDEEP
6144:ulGAxVnthTDjyTiv+4PCbm2D8LB+//wp4kfU0VW3jEDW+KQveg177cfwW+:NYVnTXeTZb/4g/KdXcADpeg177cfe
Static task
static1
Behavioral task
behavioral1
Sample
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7
-
Size
377KB
-
MD5
388ceb608b170c58c29f10ddeeb3c9f3
-
SHA1
24edfd36e667f0ba3fc56a7b3113691bd62ddf68
-
SHA256
571aac6c9270108cccb93e5326ac378aca0e33b8cd3dd235f0776aaa3c7572c7
-
SHA512
72f89e463ef5fb0d73729095f0bf9206b693b82245973ae98491d73a8a5d01c91463504cc27ea1acdddac9b17177da3da4f9e8b1d5acf02e6f20e47948ed40d8
-
SSDEEP
6144:ulGAxVnthTDjyTiv+4PCbm2D8LB+//wp4kfU0VW3jEDW+KQveg177cfwW+:NYVnTXeTZb/4g/KdXcADpeg177cfe
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-