General
-
Target
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c
-
Size
648KB
-
Sample
221127-q48myaca74
-
MD5
894076096dbed940112524f6f4c5e03e
-
SHA1
708137b59727628d351d3b13f10c5630ec7127be
-
SHA256
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c
-
SHA512
78520cf458378e6d646caa1ae2e1baaafeb3c4f2299c40c6575b64f5e76d0bb6daba34451ebf6e51fe93a8a2a43ae510200b8be46e1209cd87fa75cb6963ae2c
-
SSDEEP
12288:LW6hqMI1GJsvLBOyEtoWW6hqMI1GJsvLBOyEto1X:LW6hqMIcJgBvEtoWW6hqMIcJgBvEto1X
Static task
static1
Behavioral task
behavioral1
Sample
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c
-
Size
648KB
-
MD5
894076096dbed940112524f6f4c5e03e
-
SHA1
708137b59727628d351d3b13f10c5630ec7127be
-
SHA256
ec889c7b55d7236ba0d5bde2c5d842d15752267d38597b2eb165cd04d3c0129c
-
SHA512
78520cf458378e6d646caa1ae2e1baaafeb3c4f2299c40c6575b64f5e76d0bb6daba34451ebf6e51fe93a8a2a43ae510200b8be46e1209cd87fa75cb6963ae2c
-
SSDEEP
12288:LW6hqMI1GJsvLBOyEtoWW6hqMI1GJsvLBOyEto1X:LW6hqMIcJgBvEtoWW6hqMIcJgBvEto1X
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-