General

  • Target

    d6c7be329137dba44d7fe6f489bb5ede083ab1ce4601250d2cc7b4eecceff8b9.exe

  • Size

    236KB

  • MD5

    24b613c901bd6c26e98383641c9e7ede

  • SHA1

    107c9ed98e9061e9a29cea9d041faf7869afd181

  • SHA256

    d6c7be329137dba44d7fe6f489bb5ede083ab1ce4601250d2cc7b4eecceff8b9

  • SHA512

    07f45a5aead9afcd584c59f248e6b9c37bf473d1c84b8039db3607f3d688ce8ac7f0a84cba72e835fe5cf4ac8fae4d2127cbbffeb039fd62ad8b005152d16612

  • SSDEEP

    3072:m9bTai0rVTf7E0kkkFIrjV9TLMal1u3JV7gYGyB7EB1o/5YZAijqJdy:mYi0rVTf7E0kkkFI1GfmhyB7EB1o4qD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d6c7be329137dba44d7fe6f489bb5ede083ab1ce4601250d2cc7b4eecceff8b9.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections