General

  • Target

    81413ed396ac78afe7643bc9cf072e20e0c055b06d09c77ae65d95ffa7e4b47c.exe

  • Size

    18.3MB

  • MD5

    2c26d6595b88f541ff15e7c18fd51615

  • SHA1

    81648ed910677c3a8f13921c169eca46ffa9fd0d

  • SHA256

    81413ed396ac78afe7643bc9cf072e20e0c055b06d09c77ae65d95ffa7e4b47c

  • SHA512

    33e61bb57cb56ac812f843e49149950db9483df723cbb0c33fc5a91e6c665997f0de0c36857b8264a88566270715c403a2cfbe428a232f0928a68cd5e8ac4bc0

  • SSDEEP

    6144:gm4+2umudLLt/iP5uMBujBEigsFby1/R:K+2umudLLt/iP5vPcFb

Score
10/10

Malware Config

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 81413ed396ac78afe7643bc9cf072e20e0c055b06d09c77ae65d95ffa7e4b47c.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections