General
-
Target
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b
-
Size
23.5MB
-
Sample
221201-pbnxdseh73
-
MD5
e17a7c4417c086c76088a9f7137a6f19
-
SHA1
e7b0eee920e93afe87d1335f643315870433b453
-
SHA256
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b
-
SHA512
c3847724164c84a4018a1c2dedbe121b400d8fa595d103707fee9984973a4d2f63e70e8cbf089abdc27b0cf49c40a6f20102faef4d7669a7be2af5057aed6942
-
SSDEEP
393216:8CEqpFV8IdKGi/EJs/9SYN7vO6Nqsx2tYeA7+l8vjhAD6UAvt7c902kMdi0e6Vlg:91XkEJvYNF8sxQYX6C13t7ca2dXpSw8p
Static task
static1
Behavioral task
behavioral1
Sample
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b
-
Size
23.5MB
-
MD5
e17a7c4417c086c76088a9f7137a6f19
-
SHA1
e7b0eee920e93afe87d1335f643315870433b453
-
SHA256
aeabb18d64466d00561d4ab395b38779badd9af7e8717c786f4f3c9b5642626b
-
SHA512
c3847724164c84a4018a1c2dedbe121b400d8fa595d103707fee9984973a4d2f63e70e8cbf089abdc27b0cf49c40a6f20102faef4d7669a7be2af5057aed6942
-
SSDEEP
393216:8CEqpFV8IdKGi/EJs/9SYN7vO6Nqsx2tYeA7+l8vjhAD6UAvt7c902kMdi0e6Vlg:91XkEJvYNF8sxQYX6C13t7ca2dXpSw8p
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-