General

  • Target

    2309ed8be5fb2a40dc85075e7929e295790b47e1153439c85f571107b738ccd5.exe

  • Size

    256KB

  • MD5

    442a642a697710cd68502b9fd1ccc739

  • SHA1

    cffd2f3345dc81771d3d2a51e6d65c9409339a3f

  • SHA256

    2309ed8be5fb2a40dc85075e7929e295790b47e1153439c85f571107b738ccd5

  • SHA512

    5b0b5e558e1288dfed55fe6f161a135248da7571e39278d55e12373d8cf915d37942abeefd49da911209b3d2f0f488ed5cd686ab5b772754a45837969071f78e

  • SSDEEP

    3072:abDf+myuyGI6NZyH1YbmnhmJN1fD1Fv5tABDJY:AWmyuyGzZk1YbmGnf5FYBF

Score
10/10

Malware Config

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2309ed8be5fb2a40dc85075e7929e295790b47e1153439c85f571107b738ccd5.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections