Resubmissions

30-04-2024 20:25

240430-y7spwsha58 10

22-04-2024 01:59

240422-cetwlaed3w 10

General

  • Target

    69dcae9687cd4d5f511a73ff7e46784f9d3007d741095753c84ad44a0ed159e4

  • Size

    3.5MB

  • MD5

    2916378c4b117a4ce82c854f5a7f4a18

  • SHA1

    ff5e717e153bad4b36b0daea1de562ca94c81a3a

  • SHA256

    69dcae9687cd4d5f511a73ff7e46784f9d3007d741095753c84ad44a0ed159e4

  • SHA512

    b44cbf711b0ea6b4e6f428eba3033339cf357ab9ce13508004e7f672071e2dac2d31ced07b2591628fbf136701fdaaf3e14af87aaa060813d6aaca9b1acb7f51

  • SSDEEP

    12288:if7cVSgE29xxspm0n1vuz3K9pvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZHtPMOS:ifgdh1Xu

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 69dcae9687cd4d5f511a73ff7e46784f9d3007d741095753c84ad44a0ed159e4