General
-
Target
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65
-
Size
1008KB
-
Sample
221128-xjyessgh57
-
MD5
d0d9e35c7366d20c4e2996600b5e32fb
-
SHA1
b4f2b3bbffc7be2d643c3977c7ca864eed6ceb86
-
SHA256
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65
-
SHA512
7b0278294f08787fda49b366a535ba0bb9fd3a213d70b2afa6e03746e226a14602c02a13d2e275b9337187ecb31579e49067c6b5378c9b03a2b7f75586d854cf
-
SSDEEP
24576:NP3tMh0BxZC6AXPtWskmkNbY1XQXUpTfkDXfJH:R3tMh0k7PPkmPAMjkzB
Static task
static1
Behavioral task
behavioral1
Sample
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65
-
Size
1008KB
-
MD5
d0d9e35c7366d20c4e2996600b5e32fb
-
SHA1
b4f2b3bbffc7be2d643c3977c7ca864eed6ceb86
-
SHA256
dd42fa589c17688c69afb046241371cec15b8049aa06c53b0f27acc5af727c65
-
SHA512
7b0278294f08787fda49b366a535ba0bb9fd3a213d70b2afa6e03746e226a14602c02a13d2e275b9337187ecb31579e49067c6b5378c9b03a2b7f75586d854cf
-
SSDEEP
24576:NP3tMh0BxZC6AXPtWskmkNbY1XQXUpTfkDXfJH:R3tMh0k7PPkmPAMjkzB
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-