General
-
Target
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b
-
Size
746KB
-
Sample
221128-sfe2tsgb6x
-
MD5
b1d63ea494b854963eefc6e0402160d4
-
SHA1
c2f3eff9fc4e1b315071857095430ef423ae50b9
-
SHA256
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b
-
SHA512
33a801ae1ead10565cc26389057046f7a77ecdec0635764fa745ebca0a67a5dd4bdb2bdbebc9ff13ec574c78337616d5923c709e02dad2549560c27133fefc47
-
SSDEEP
12288:qUF0w0d/26SSYTiOp94stU254YcGBciJd:7F0w0VzK4p2NBcin
Static task
static1
Behavioral task
behavioral1
Sample
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b
-
Size
746KB
-
MD5
b1d63ea494b854963eefc6e0402160d4
-
SHA1
c2f3eff9fc4e1b315071857095430ef423ae50b9
-
SHA256
8f558ab354bd916a256772c1a33d983fd0cc90241d6374634d3b32ad6dd01e2b
-
SHA512
33a801ae1ead10565cc26389057046f7a77ecdec0635764fa745ebca0a67a5dd4bdb2bdbebc9ff13ec574c78337616d5923c709e02dad2549560c27133fefc47
-
SSDEEP
12288:qUF0w0d/26SSYTiOp94stU254YcGBciJd:7F0w0VzK4p2NBcin
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-