General
-
Target
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3
-
Size
480KB
-
Sample
230129-hpyv7aec2v
-
MD5
84730977d3c5921ce72f06569e0303d7
-
SHA1
0136a583df02745bdc1bbef21e6bf395a07a87ab
-
SHA256
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3
-
SHA512
9f4b3eecb443f0b7b8cfc30dec73a2e04d639406e6c7c945382173d8bd11d12d28bb9e4888469ea0873e8f0c5b43ec0e9f3b6688afb8242dec451a353aa9e368
-
SSDEEP
12288:diJu+2t874tMkvsVSKgMG5PJVSiFCtDM:druNMMG5nSiFCtD
Static task
static1
Behavioral task
behavioral1
Sample
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3
-
Size
480KB
-
MD5
84730977d3c5921ce72f06569e0303d7
-
SHA1
0136a583df02745bdc1bbef21e6bf395a07a87ab
-
SHA256
c9c15c614ea8a43be81ad6da31b320a1577f142ee1ec84e498bede89d360bdb3
-
SHA512
9f4b3eecb443f0b7b8cfc30dec73a2e04d639406e6c7c945382173d8bd11d12d28bb9e4888469ea0873e8f0c5b43ec0e9f3b6688afb8242dec451a353aa9e368
-
SSDEEP
12288:diJu+2t874tMkvsVSKgMG5PJVSiFCtDM:druNMMG5nSiFCtD
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-