General

  • Target

    bb805cb4c853f3c5b225622bcf6d526a6ec1f456086ae3354689a24af47db465.exe

  • Size

    234KB

  • MD5

    240217591865d6c4110f8daf8e23446a

  • SHA1

    5566c6a99144b163d19d3c5e4b80c73b8dde3da4

  • SHA256

    bb805cb4c853f3c5b225622bcf6d526a6ec1f456086ae3354689a24af47db465

  • SHA512

    70c6e65377a35e4e494f375dc5ee758a3d173b72453afc38d09608a854a5ea23bb4a55d27dc8b7541d549689fdc98ca3318f263c2e2e9767981bf52e15780d33

  • SSDEEP

    3072:AeqeCmyuznk4GjaHbjDld7+348qeNCB25o0cIgVX:AeqeCmyuznk4GjabjDj7h8q42lNIE

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bb805cb4c853f3c5b225622bcf6d526a6ec1f456086ae3354689a24af47db465.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections