General
-
Target
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598
-
Size
4.7MB
-
Sample
221129-br8d3sfa36
-
MD5
70174833a54bd0748a476c3877b1e91c
-
SHA1
4bbe522c0f5f8348049c93ab946c635cfd1365b0
-
SHA256
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598
-
SHA512
540b38a51aafa263f3f538e065919c686952e762980d8d31d332962ff30fa4bdc72c4f0bfd9fd527831fbf56f751903768d55e0e89044f141ce5572334022b38
-
SSDEEP
98304:Ayh2A9KPK/5/o4IFIqRi97IThdHFNP6Fh8MIWEpUeB6tFDWjF8hEWJ9cNb:v2vwA4IrS72dlNP6FFpMUeBcg8hrJ9ib
Static task
static1
Behavioral task
behavioral1
Sample
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598
-
Size
4.7MB
-
MD5
70174833a54bd0748a476c3877b1e91c
-
SHA1
4bbe522c0f5f8348049c93ab946c635cfd1365b0
-
SHA256
f186f635a43305c610cad7abc0b55d7287fb3a9c5e6b9a55004c2bc2d1201598
-
SHA512
540b38a51aafa263f3f538e065919c686952e762980d8d31d332962ff30fa4bdc72c4f0bfd9fd527831fbf56f751903768d55e0e89044f141ce5572334022b38
-
SSDEEP
98304:Ayh2A9KPK/5/o4IFIqRi97IThdHFNP6Fh8MIWEpUeB6tFDWjF8hEWJ9cNb:v2vwA4IrS72dlNP6FFpMUeBcg8hrJ9ib
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-