General
-
Target
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822
-
Size
405KB
-
Sample
221130-qwb9rshb3v
-
MD5
99aec7c9dfe5997629865111c661ea3b
-
SHA1
8de9938997643e618a40c610d58740e992d185b6
-
SHA256
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822
-
SHA512
f721b155bc35f04295961894fcca86d124beb4679431091c13511ff59b26d9476fd27480e02adcdc592d4d0b57a81a0aebc29365b112468599d4f0091ebd04da
-
SSDEEP
6144:k3Et0r+l3xSv19xRWl8q9BORHuts38YK1F5gGTUwP+WMt0e2q:CEtefvzxclMut6871Ltb2WO0y
Static task
static1
Behavioral task
behavioral1
Sample
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822
-
Size
405KB
-
MD5
99aec7c9dfe5997629865111c661ea3b
-
SHA1
8de9938997643e618a40c610d58740e992d185b6
-
SHA256
7928dac0e4bbbcd00a01f766eaf89e1469e7eb8e5f46d2015f67e8c5dd045822
-
SHA512
f721b155bc35f04295961894fcca86d124beb4679431091c13511ff59b26d9476fd27480e02adcdc592d4d0b57a81a0aebc29365b112468599d4f0091ebd04da
-
SSDEEP
6144:k3Et0r+l3xSv19xRWl8q9BORHuts38YK1F5gGTUwP+WMt0e2q:CEtefvzxclMut6871Ltb2WO0y
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-