General
-
Target
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68
-
Size
1005KB
-
Sample
221128-v4ky4age2w
-
MD5
2d7e8e8cdeeaca9f5027dee94d7c1d5d
-
SHA1
676ce435617ad00f570feaef0074c30d0526ba4b
-
SHA256
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68
-
SHA512
54ffa24395e8dd73dd0bb448c15b53ad465254ab694a924919d2aab297381ed39d1a01da77d1192c90e0816b4e80abc5d445966a1efa5f75bbfcb6cd8677d93b
-
SSDEEP
24576:YgWEXtey6BxhWU5951duuNACzX/QmLTt2Dp49JRxkHOh:/WWoBHx51dBNAit2N49Nk
Static task
static1
Behavioral task
behavioral1
Sample
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68
-
Size
1005KB
-
MD5
2d7e8e8cdeeaca9f5027dee94d7c1d5d
-
SHA1
676ce435617ad00f570feaef0074c30d0526ba4b
-
SHA256
a98b92e0f48f383d15b39290e98069fb13ec3bc52451cbc927b6988e99126f68
-
SHA512
54ffa24395e8dd73dd0bb448c15b53ad465254ab694a924919d2aab297381ed39d1a01da77d1192c90e0816b4e80abc5d445966a1efa5f75bbfcb6cd8677d93b
-
SSDEEP
24576:YgWEXtey6BxhWU5951duuNACzX/QmLTt2Dp49JRxkHOh:/WWoBHx51dBNAit2N49Nk
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-