General
-
Target
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0
-
Size
311KB
-
Sample
221126-aspspacf9x
-
MD5
903e424e8012d31fd6bfde2b6715a620
-
SHA1
ebd025a6d84e561ba262f8ce987cf16819785f7b
-
SHA256
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0
-
SHA512
bbd3406886b8685ebcba82aa0f571d21e8a359986a149e27979bee60aed7f9252dd7360d5db58ee899b3215fdb5c3e737f265a5582d8683bdf245dd188d76e45
-
SSDEEP
6144:nlGAxVnth2DTlanWgvj9TyaXnckaREqjf:MYVnT/WSpyacFCSf
Static task
static1
Behavioral task
behavioral1
Sample
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0
-
Size
311KB
-
MD5
903e424e8012d31fd6bfde2b6715a620
-
SHA1
ebd025a6d84e561ba262f8ce987cf16819785f7b
-
SHA256
05300d824d2039909a2b3bd54f570ef61df36f81d75ab421b2b723f5dd3915e0
-
SHA512
bbd3406886b8685ebcba82aa0f571d21e8a359986a149e27979bee60aed7f9252dd7360d5db58ee899b3215fdb5c3e737f265a5582d8683bdf245dd188d76e45
-
SSDEEP
6144:nlGAxVnth2DTlanWgvj9TyaXnckaREqjf:MYVnT/WSpyacFCSf
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-