General

  • Target

    1cf2ffed1b2a4e4b236e3de5dcd85b5472233d890302c3c48bb6290c9bdad664.exe

  • Size

    264KB

  • MD5

    dc741d7804cf1b1e1ed7fccfa8978246

  • SHA1

    6f8a6adae089c002a7d1393c154dc12583f1bd94

  • SHA256

    1cf2ffed1b2a4e4b236e3de5dcd85b5472233d890302c3c48bb6290c9bdad664

  • SHA512

    92671fd8df34903e0b5a9b3da7f62a39c8e6ccba99705b1c111ea7e556aa792d28dbd2eb22588d14eff54f1f6372b72c4380f40f995f023ee59e7b6c2e19feaf

  • SSDEEP

    3072:/QfPvfPSnE1JU75szKizLQh7b13/li6L5noOxld8:/QfPvfPSE1JU7azKizLQh7p9i/O/d

Score
10/10

Malware Config

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1cf2ffed1b2a4e4b236e3de5dcd85b5472233d890302c3c48bb6290c9bdad664.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections