General
-
Target
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe
-
Size
962KB
-
Sample
250202-mgmkeazjdq
-
MD5
05fef27b342e781baf4afb4a5b62cac3
-
SHA1
538f859e713439d99efb1491bfbe2c99005e209f
-
SHA256
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01
-
SHA512
b58d6351a7503b330d9cc96926f9e05514f6106fc560cfc89d3ce04cbfa8885394c296798485630b2b61d96c72f2aa3230838e63b33d2b9481876f6267d16435
-
SSDEEP
24576:Jt24wfvf7a8DPw67oc1xuzoVF5r5QAwFv0XcI:1ef7aD6Ffuw7B2fI
Static task
static1
Behavioral task
behavioral1
Sample
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01.exe
-
Size
962KB
-
MD5
05fef27b342e781baf4afb4a5b62cac3
-
SHA1
538f859e713439d99efb1491bfbe2c99005e209f
-
SHA256
7606d0813a456f9f7599614e892ebd824ea29dda6b1d49c3d28210a79c253e01
-
SHA512
b58d6351a7503b330d9cc96926f9e05514f6106fc560cfc89d3ce04cbfa8885394c296798485630b2b61d96c72f2aa3230838e63b33d2b9481876f6267d16435
-
SSDEEP
24576:Jt24wfvf7a8DPw67oc1xuzoVF5r5QAwFv0XcI:1ef7aD6Ffuw7B2fI
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Modifies visiblity of hidden/system files in Explorer
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2