General
-
Target
NEAS.b1b7840a85f47492bd18a14f259271c0.exe
-
Size
487KB
-
Sample
231108-b3mlrabe4t
-
MD5
b1b7840a85f47492bd18a14f259271c0
-
SHA1
2e4857ca0af00740f2b592eb06607821cef8ecf0
-
SHA256
b069c79498e11412e2b2725479aee383a1a785c8f2bc32e6bcb0fd78de51f5dc
-
SHA512
9096bb99397ed9dc7c7fb5118c85e06b80ad7c3b1c1da9b5dbf82446f1f3f37af8bf4638a7b062b16b31a32a113277f94641602c279d702f96acc8983ffef07a
-
SSDEEP
12288:Pz9ruEtMylb/u7nZxFRD8q4hU0IJDqNC5eR:1uEthl0nRpV0+qN
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b1b7840a85f47492bd18a14f259271c0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.b1b7840a85f47492bd18a14f259271c0.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
NEAS.b1b7840a85f47492bd18a14f259271c0.exe
-
Size
487KB
-
MD5
b1b7840a85f47492bd18a14f259271c0
-
SHA1
2e4857ca0af00740f2b592eb06607821cef8ecf0
-
SHA256
b069c79498e11412e2b2725479aee383a1a785c8f2bc32e6bcb0fd78de51f5dc
-
SHA512
9096bb99397ed9dc7c7fb5118c85e06b80ad7c3b1c1da9b5dbf82446f1f3f37af8bf4638a7b062b16b31a32a113277f94641602c279d702f96acc8983ffef07a
-
SSDEEP
12288:Pz9ruEtMylb/u7nZxFRD8q4hU0IJDqNC5eR:1uEthl0nRpV0+qN
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-