General

  • Target

    333092f6705f7e8dd3923aa886e1ea495257fa4b57a02fbead9bc5a2e9fe74b3.exe

  • Size

    236KB

  • MD5

    935091d7c79381d402d30372962335d8

  • SHA1

    e9a380a4d44172684033bf9fd846c6bdf56ffe06

  • SHA256

    333092f6705f7e8dd3923aa886e1ea495257fa4b57a02fbead9bc5a2e9fe74b3

  • SHA512

    87a3c22bce9f4e3e0d88097585da3099ade5da80794ab4e3e8870b68f9e537ab58730149febb6896f1af435dd9187d570edcf0ad541d8512b191a1cf567c05b7

  • SSDEEP

    3072:WUapN5VZmVSJF5iDt6coCvLbDVv52EsvBV:WUapN5VZmVmbiEazXVjsJ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 333092f6705f7e8dd3923aa886e1ea495257fa4b57a02fbead9bc5a2e9fe74b3.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections