General
-
Target
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4
-
Size
703KB
-
Sample
221129-m2967scd29
-
MD5
19267e9740aa0b82458d47205147d260
-
SHA1
dfd35f3b69bbe3a9b5c4da7ecce400bddd031cea
-
SHA256
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4
-
SHA512
2096e7a2907781990f0122ba15a6fb024c7b62656e94abd6dc2b41e33617fe393079ada21ba3f925aad2d629d2c00b22c69f9ebf27bd56b0c653e86253b9c0e4
-
SSDEEP
12288:Bxb7DuiQkDYtkE+18hf9h3T5KT3F+4tLLHj5F/Vd4fXVqh:ffTQkD3EkSP3AV7hdui
Static task
static1
Behavioral task
behavioral1
Sample
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4
-
Size
703KB
-
MD5
19267e9740aa0b82458d47205147d260
-
SHA1
dfd35f3b69bbe3a9b5c4da7ecce400bddd031cea
-
SHA256
db84e18be1fbebc285a4c8f2f7ece79940b7a681172f6d38e382916dc33368b4
-
SHA512
2096e7a2907781990f0122ba15a6fb024c7b62656e94abd6dc2b41e33617fe393079ada21ba3f925aad2d629d2c00b22c69f9ebf27bd56b0c653e86253b9c0e4
-
SSDEEP
12288:Bxb7DuiQkDYtkE+18hf9h3T5KT3F+4tLLHj5F/Vd4fXVqh:ffTQkD3EkSP3AV7hdui
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-