General
-
Target
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7.exe
-
Size
492KB
-
Sample
241205-s8xscaxkfk
-
MD5
21180ba0d386f9b0ccb0ca37b61153c4
-
SHA1
29c622c71036b432c575ea960ead18e19b484d9e
-
SHA256
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7
-
SHA512
505370aaee0ca0a943ac4cd6a52c94ae94741995ea1d1c2951735041b3007e37b0e9368bee60c751e1cf25c5d73df612f5d15e8e58ba12de376997bae0624e42
-
SSDEEP
12288:/knms/dM9gz8NRRIaV3GhQxHNcmdqG8Doj64:/knm2wZxgQxHqm8Ggoj64
Static task
static1
Behavioral task
behavioral1
Sample
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7.exe
-
Size
492KB
-
MD5
21180ba0d386f9b0ccb0ca37b61153c4
-
SHA1
29c622c71036b432c575ea960ead18e19b484d9e
-
SHA256
348e41e753d39d03a43ce763b65cab77813c954ad17a7741d729372d2fdb59a7
-
SHA512
505370aaee0ca0a943ac4cd6a52c94ae94741995ea1d1c2951735041b3007e37b0e9368bee60c751e1cf25c5d73df612f5d15e8e58ba12de376997bae0624e42
-
SSDEEP
12288:/knms/dM9gz8NRRIaV3GhQxHNcmdqG8Doj64:/knm2wZxgQxHqm8Ggoj64
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-