General
-
Target
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e
-
Size
1.1MB
-
Sample
221130-fj9dmacd7x
-
MD5
b6e5ba759e4214e47e9b643c6db3869e
-
SHA1
1cfa3edb8d3da4ec40f9aebe6a6d110032da6640
-
SHA256
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e
-
SHA512
0e1b7b04aa8493417a01acbca28c090b5e6d2ec83864ac11f1a9583b5321a078a469c5c12a54475766ed67695c33a86da71795ea5afbe2d3e9ce924d6ad4d1d5
-
SSDEEP
12288:VfVr/5D5Jy/ei02wu+OHW7/Bpk+EJJt/ZAyNIQACAFFDfCCDL3WM8iJO05k4NKO5:RV5Hy/phw/98m/fpv3WM8i9v
Static task
static1
Behavioral task
behavioral1
Sample
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e
-
Size
1.1MB
-
MD5
b6e5ba759e4214e47e9b643c6db3869e
-
SHA1
1cfa3edb8d3da4ec40f9aebe6a6d110032da6640
-
SHA256
c1cd4599831b74bdbcdfd714440d72f582b1915e333702bee41e82e49ef15d9e
-
SHA512
0e1b7b04aa8493417a01acbca28c090b5e6d2ec83864ac11f1a9583b5321a078a469c5c12a54475766ed67695c33a86da71795ea5afbe2d3e9ce924d6ad4d1d5
-
SSDEEP
12288:VfVr/5D5Jy/ei02wu+OHW7/Bpk+EJJt/ZAyNIQACAFFDfCCDL3WM8iJO05k4NKO5:RV5Hy/phw/98m/fpv3WM8i9v
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-