General
-
Target
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16
-
Size
336KB
-
Sample
221201-jltbzaca5z
-
MD5
ec298132c73e3a4a55fb3f7b8d070830
-
SHA1
1b900fb2438b437e1cecab687f279623392a41dd
-
SHA256
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16
-
SHA512
4741759518e310964bdf6bbd30ded231db2e333fc7299d1f209b7faf8c95a48c98f6cce30e363e6d599c32018c1fd364bd86223eaac7cddc9d24415b37b8ae61
-
SSDEEP
6144:jiC6ngfT4Pm1wy9hWIWCtV3/rGBP5sgDiZUM5n98506WuK2T:jhfT4GmIbt9KBP5sqS98ZWL2
Static task
static1
Behavioral task
behavioral1
Sample
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16
-
Size
336KB
-
MD5
ec298132c73e3a4a55fb3f7b8d070830
-
SHA1
1b900fb2438b437e1cecab687f279623392a41dd
-
SHA256
51056e3dfe5ad18403968342a264b440f6f6e10c22d2595a94764aa636d6ee16
-
SHA512
4741759518e310964bdf6bbd30ded231db2e333fc7299d1f209b7faf8c95a48c98f6cce30e363e6d599c32018c1fd364bd86223eaac7cddc9d24415b37b8ae61
-
SSDEEP
6144:jiC6ngfT4Pm1wy9hWIWCtV3/rGBP5sgDiZUM5n98506WuK2T:jhfT4GmIbt9KBP5sqS98ZWL2
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-