General
-
Target
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d
-
Size
4.2MB
-
Sample
221129-br661saf6s
-
MD5
4d7d8ac837650c855e1e8c7906947ef6
-
SHA1
a4dedd6894536f76bae99fa2c034a1be5015308c
-
SHA256
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d
-
SHA512
9674eed9e4efd647a644bf2520dbf8f7ef0b434b558f58a141553c1b0a279fe614cf3a9e21df5b3b3b32cc82c34db78c3cf7c89c0fe31839140a5f8e30c67ab7
-
SSDEEP
98304:ful+CxSktOO7BOBsGstsuGRZsi0/mh/ZMFidqll5UoL27wnvvMo+A:mlLx5F6sGstiyilwod4UoLyws+
Static task
static1
Behavioral task
behavioral1
Sample
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d
-
Size
4.2MB
-
MD5
4d7d8ac837650c855e1e8c7906947ef6
-
SHA1
a4dedd6894536f76bae99fa2c034a1be5015308c
-
SHA256
f5c2308a61ec4340c0c0acfa76d055219af805d511197a826531e6f7f0c0263d
-
SHA512
9674eed9e4efd647a644bf2520dbf8f7ef0b434b558f58a141553c1b0a279fe614cf3a9e21df5b3b3b32cc82c34db78c3cf7c89c0fe31839140a5f8e30c67ab7
-
SSDEEP
98304:ful+CxSktOO7BOBsGstsuGRZsi0/mh/ZMFidqll5UoL27wnvvMo+A:mlLx5F6sGstiyilwod4UoLyws+
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-