General
-
Target
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6
-
Size
1.9MB
-
Sample
221126-qv1wqsbb3t
-
MD5
b6c924512eeb2bf21ee6238d3a3319aa
-
SHA1
2e52443488b20f7675af80e8ed3911db4ba673a1
-
SHA256
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6
-
SHA512
e1bcc6df964a5cf50de6659ca872d9f2bb2e5f92123358019bec28021278ac6d12c7f4627020bdcf81507a81449fd52f6739a2d258b1582b62d459aa15efc08a
-
SSDEEP
49152:3zh0TB9kenwcdUC9g0zXNk+rRas21xh9qJMtn2bJ7Ck7n:jhkbkcwcH9g0zXGh1xhYMl2bJ7Cin
Static task
static1
Behavioral task
behavioral1
Sample
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6
-
Size
1.9MB
-
MD5
b6c924512eeb2bf21ee6238d3a3319aa
-
SHA1
2e52443488b20f7675af80e8ed3911db4ba673a1
-
SHA256
197c71387c8350bf14d11fbd629e34eb03ac2db863f0b7502ff50bf1dfbeaba6
-
SHA512
e1bcc6df964a5cf50de6659ca872d9f2bb2e5f92123358019bec28021278ac6d12c7f4627020bdcf81507a81449fd52f6739a2d258b1582b62d459aa15efc08a
-
SSDEEP
49152:3zh0TB9kenwcdUC9g0zXNk+rRas21xh9qJMtn2bJ7Ck7n:jhkbkcwcH9g0zXGh1xhYMl2bJ7Cin
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-