General
-
Target
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7_JC.exe
-
Size
392KB
-
Sample
231011-2k9axabc76
-
MD5
04ce3268080cb301ad8202217685ca59
-
SHA1
b5466d71f17fb9f454cee13a83faf7c1e2d0022d
-
SHA256
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7
-
SHA512
3feecf60ae8f5aa9dbba576cf61b9db8f7359ce6056ecd8c463898f4cb301242280101c5f56143b79ae07c043270612299f43246d144700d0aba0fa2970bf715
-
SSDEEP
12288:+/nedKoh5Y6yMYmWjBJlpeSzoD7O1CR3m:2gdh5NKtJD8PrR3m
Static task
static1
Behavioral task
behavioral1
Sample
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7_JC.exe
-
Size
392KB
-
MD5
04ce3268080cb301ad8202217685ca59
-
SHA1
b5466d71f17fb9f454cee13a83faf7c1e2d0022d
-
SHA256
4f619c7b4f54dd6ed7833880c8600334c42084a20c73d9b76973d45202a734c7
-
SHA512
3feecf60ae8f5aa9dbba576cf61b9db8f7359ce6056ecd8c463898f4cb301242280101c5f56143b79ae07c043270612299f43246d144700d0aba0fa2970bf715
-
SSDEEP
12288:+/nedKoh5Y6yMYmWjBJlpeSzoD7O1CR3m:2gdh5NKtJD8PrR3m
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-