General

  • Target

    56d37fcfd2886d0ec5e00b14c68bcda160051c3f57e7a676463de661afddcff1

  • Size

    466KB

  • MD5

    6ebc82ad2b8adb7fcf9cd9e436d63fbc

  • SHA1

    b738e2cb3208fc6c9e7ba8c37afc8c6f0430180a

  • SHA256

    56d37fcfd2886d0ec5e00b14c68bcda160051c3f57e7a676463de661afddcff1

  • SHA512

    b55438d125ea66cc0ffaff51d0b99276fca866e08f27405e36dce0c039f41defd61750ebc3f672ff9ee6389a6dc86bec4dad5fac78b821e7f4fb23114bab29e6

  • SSDEEP

    3072:wgIYqINcrntoaLx8RvZ3VO7iTqEoDOQW2HfLcGAoaKTkmG5QjA3tVNo2JOO/Ui8r:2/ngdkimtKQBT0TJdrb/UQPdBZ+

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • ModiLoader Second Stage 1 IoCs
  • Modiloader family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 56d37fcfd2886d0ec5e00b14c68bcda160051c3f57e7a676463de661afddcff1
    .js