General

  • Target

    6ded4860d0d448a3d6be053aeeb5dc5807237c626dde9e8753fb8e391a20085f

  • Size

    264KB

  • MD5

    001d2d017b5a7716053d3f1486270f41

  • SHA1

    134e90a630685756e64d4f9261a42b16a429bfb4

  • SHA256

    6ded4860d0d448a3d6be053aeeb5dc5807237c626dde9e8753fb8e391a20085f

  • SHA512

    dea76160993edc1e8b7e521a312fc8ad6b24fb13686650788ae17b573e7a6f0f56862c9368e9f18671d9efaa341cbbfcd03627f0fd8eb75c0985d6206ac9f0fe

  • SSDEEP

    3072:V0Yi1Dv5+lRM0kkE0SrkY96A07YJqm05ieY639:VSDv5+lRM0kkE0Srk7r7AqmkYW

Score
10/10

Malware Config

Signatures

  • Agenttesla family
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6ded4860d0d448a3d6be053aeeb5dc5807237c626dde9e8753fb8e391a20085f
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections