General

  • Target

    f8ac6648be8a2d711d4b22c29c96f2a88a9bc25c831f782020a35d3083aa0d33.exe

  • Size

    234KB

  • MD5

    eee08a8f848a18651202d1d70696cac2

  • SHA1

    7890c16ef5ab0180194064509d0bdc6831fa6d3c

  • SHA256

    f8ac6648be8a2d711d4b22c29c96f2a88a9bc25c831f782020a35d3083aa0d33

  • SHA512

    7d43dfdbeae8114ecd78008bc6904a52d651038baa5b348dd8774a79e0a6e19b9656faf769528c3730b9d5e0251169da704d991e2b9a7071e82a781bd826bc6d

  • SSDEEP

    3072:SUX4h7lx1JlzGEBcb5pv4SI4AAtKx/5F1eVrwO:SUX4h7lx1JlaEBcb5B4yh0x9eV0

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f8ac6648be8a2d711d4b22c29c96f2a88a9bc25c831f782020a35d3083aa0d33.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections