General
-
Target
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604
-
Size
500KB
-
Sample
221207-cyrwcagb29
-
MD5
55a6f3e924a18d368756c29d582a3e67
-
SHA1
4e19a9ee30d00f829ca884b0ab9b43e3d6b3f778
-
SHA256
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604
-
SHA512
380c1cd13ce5ceab2db30d2d4a71d4a5315a8b8321dc8928cb33d34ea6aabbaccb9dffa5f783d1fb5ad1aed92701acb5601c1c7e1a419014b394e0cfe44ffa8c
-
SSDEEP
12288:ozE679I8/ZdkB7qeGvRHHVlXqgGzP+4WvX5nxzpsBc8gdlLGc8:ozD7i8ANGZH6RT+L9xaBc8gac8
Static task
static1
Behavioral task
behavioral1
Sample
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604
-
Size
500KB
-
MD5
55a6f3e924a18d368756c29d582a3e67
-
SHA1
4e19a9ee30d00f829ca884b0ab9b43e3d6b3f778
-
SHA256
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604
-
SHA512
380c1cd13ce5ceab2db30d2d4a71d4a5315a8b8321dc8928cb33d34ea6aabbaccb9dffa5f783d1fb5ad1aed92701acb5601c1c7e1a419014b394e0cfe44ffa8c
-
SSDEEP
12288:ozE679I8/ZdkB7qeGvRHHVlXqgGzP+4WvX5nxzpsBc8gdlLGc8:ozD7i8ANGZH6RT+L9xaBc8gac8
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-