General

  • Target

    4c7c97dc3c9d11cdf54c1f8e0da90e307d171c898359ea3f45bb1840e289f9cc

  • Size

    455KB

  • MD5

    d8677b900cc76749bfca931c0bd99696

  • SHA1

    e2e8437851851e977c718151e2cc0ff0d1e7698b

  • SHA256

    4c7c97dc3c9d11cdf54c1f8e0da90e307d171c898359ea3f45bb1840e289f9cc

  • SHA512

    63c7f95b6193e3d0f7bfe9ea00ece1a2de985b2177b6958e48afe389dec37e63f40d07ac7687b00a20475456aa5883303bb70f481bb9571c6148e3164a58fcbe

  • SSDEEP

    3072:GTftGvGEwq/tjjpYzDwfPNI5AwOCinwoRzD0SfOmtIpxwW7203Wkt42d4p72/GQ4:z2qGDcsAZ2K0Oa9ho7234Rc0J

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • ModiLoader Second Stage 1 IoCs
  • Modiloader family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 4c7c97dc3c9d11cdf54c1f8e0da90e307d171c898359ea3f45bb1840e289f9cc
    .js