General
-
Target
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN
-
Size
4.8MB
-
Sample
240929-2mw4csteqj
-
MD5
f62e712524cf372a41e60689829ce5e0
-
SHA1
6c55af73c51e5737d7345a7736f8d2339b6bc07a
-
SHA256
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53c
-
SHA512
4333a5d4f50ceb0fe937cb362e45df30010da3faeef33fab290182df0ae0ae0b0f30504591de4d375437bc1fbfe45acaf657d2b0ee81847c0a46c8f9de65dfd0
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53cN
-
Size
4.8MB
-
MD5
f62e712524cf372a41e60689829ce5e0
-
SHA1
6c55af73c51e5737d7345a7736f8d2339b6bc07a
-
SHA256
3b1a47dd007d08a155a42c8736cff82b1a18f54b1e68cbfc6f3aa0da539cf53c
-
SHA512
4333a5d4f50ceb0fe937cb362e45df30010da3faeef33fab290182df0ae0ae0b0f30504591de4d375437bc1fbfe45acaf657d2b0ee81847c0a46c8f9de65dfd0
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-