General
-
Target
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e
-
Size
556KB
-
Sample
221127-dbmtjshc6w
-
MD5
6790f0bf067752bfaf78ba990124f2a3
-
SHA1
aacfbd563a2b8d691d6a48b0037f8f27a5a67273
-
SHA256
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e
-
SHA512
f0cc570c3a10b27567df91281eaf48ff3b56092c4453171086510ac1d804f86c06f239274307cc85c9aeb4742ca18d50f6efbf66f8be1a1c308df3852a2b4c80
-
SSDEEP
12288:yqy7GFKFPOQ1g83Qa04/mAB/3+xnrMVbAW2:exROQ1gBFWbAW
Static task
static1
Behavioral task
behavioral1
Sample
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e
-
Size
556KB
-
MD5
6790f0bf067752bfaf78ba990124f2a3
-
SHA1
aacfbd563a2b8d691d6a48b0037f8f27a5a67273
-
SHA256
e637bb2c32ba8346c2dd31f7f471b52c5f5f216b5fb6c394b5c67bdd77b9cc1e
-
SHA512
f0cc570c3a10b27567df91281eaf48ff3b56092c4453171086510ac1d804f86c06f239274307cc85c9aeb4742ca18d50f6efbf66f8be1a1c308df3852a2b4c80
-
SSDEEP
12288:yqy7GFKFPOQ1g83Qa04/mAB/3+xnrMVbAW2:exROQ1gBFWbAW
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-