General
-
Target
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e.exe
-
Size
540KB
-
Sample
250107-nvjw4s1pem
-
MD5
37a3ec1dcef87ab6828f9a8d1f998298
-
SHA1
7d8fb255d8fc4d2af7cd5896498ceee6f29323d8
-
SHA256
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e
-
SHA512
f4337776424093ff33848b703931d00ebff29894cb6a7d77a0036062f38d64d505250047db51962db613dcd21c3a7163c0100ebf3bf838fbff75ab1cff87f9b8
-
SSDEEP
12288:Ghxc3TIlqGJs1jpqttRiOsopj8X8TsWELBpGkjrkgbPp2UJSVEtoPC5:ucoCyb6aIMTsWAfGONUkgEWPy
Static task
static1
Behavioral task
behavioral1
Sample
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e.exe
-
Size
540KB
-
MD5
37a3ec1dcef87ab6828f9a8d1f998298
-
SHA1
7d8fb255d8fc4d2af7cd5896498ceee6f29323d8
-
SHA256
27cba389076973839b6dd510d35233ec828896802b7eb462f80844514fd6aa7e
-
SHA512
f4337776424093ff33848b703931d00ebff29894cb6a7d77a0036062f38d64d505250047db51962db613dcd21c3a7163c0100ebf3bf838fbff75ab1cff87f9b8
-
SSDEEP
12288:Ghxc3TIlqGJs1jpqttRiOsopj8X8TsWELBpGkjrkgbPp2UJSVEtoPC5:ucoCyb6aIMTsWAfGONUkgEWPy
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2