General

  • Target

    0b339883d9d76c11e4b22915fa67303fb4302d9855e219db7e803e693e6fb899

  • Size

    405KB

  • MD5

    1cbbb572f88a23f55f086b96327fe5e0

  • SHA1

    6d1593368828198dfb5b9eceaab71f49aa535c40

  • SHA256

    0b339883d9d76c11e4b22915fa67303fb4302d9855e219db7e803e693e6fb899

  • SHA512

    dcab6c6025ca9da5301cb6913be35d4285d1ceecc9bd811dfd23727b1b2a14618f3e7a98c18d7a335373c5160c9cb5f62c10f0385387ab7417fc917283981ffd

  • SSDEEP

    3072:WV9Es470kT97kFUxz3mKMACR3R7DyWvEXNemiS0KPMID5whT0bMNj67:dwkwM3zUJtMtwmIj67

Malware Config

Signatures

  • AgentTesla Payload 1 IoCs
  • Agenttesla family
  • DarkTrack Payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile Payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Lockfile family
  • M00nD3v Logger Payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main Payload 1 IoCs
  • Matiex family
  • Mountlocker family
  • Shurk Stealer Payload 1 IoCs
  • Shurk family
  • StormKitty Payload 1 IoCs
  • Stormkitty family

Files

  • 0b339883d9d76c11e4b22915fa67303fb4302d9855e219db7e803e693e6fb899
    .js