General
-
Target
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d_JC.exe
-
Size
863KB
-
Sample
230924-rpcsdshd77
-
MD5
8c57dda2b134801321a87c65cfb4fd85
-
SHA1
177ef72837380cff667111373695138decc972f3
-
SHA256
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d
-
SHA512
5642c315cec341fd0c9a63a27d43971bcd62960d45a778dddcfde7cba8881a430566f2f6a7e7897c7252edad1651c2fadfde047b4e904ff3840f3f3472f12d4a
-
SSDEEP
24576:P2O/GlsQSLG/5vEprm6QTkw7g6zwm4m53Sb2xIJ:GSLLmJkw5kFm53SyxIJ
Static task
static1
Behavioral task
behavioral1
Sample
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d_JC.exe
-
Size
863KB
-
MD5
8c57dda2b134801321a87c65cfb4fd85
-
SHA1
177ef72837380cff667111373695138decc972f3
-
SHA256
e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d
-
SHA512
5642c315cec341fd0c9a63a27d43971bcd62960d45a778dddcfde7cba8881a430566f2f6a7e7897c7252edad1651c2fadfde047b4e904ff3840f3f3472f12d4a
-
SSDEEP
24576:P2O/GlsQSLG/5vEprm6QTkw7g6zwm4m53Sb2xIJ:GSLLmJkw5kFm53SyxIJ
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-