General

  • Target

    0671204843d2df3f7ec445bcabdf709f1628740b3d2b0e139e7bbc651844ed5d

  • Size

    3.6MB

  • MD5

    70ea61fbd07c912ac47d0684b7c8966d

  • SHA1

    e3192cf95562753394240da9493ffb7d4adee22f

  • SHA256

    0671204843d2df3f7ec445bcabdf709f1628740b3d2b0e139e7bbc651844ed5d

  • SHA512

    4171c27f738ea7f9be17be7830d0f23f27a385411b00779120c8c2b388f6548c5de8590444211a62122d7f640673baf351fd6845fcffbf0ec9c58f9aa9bbd1c7

  • SSDEEP

    12288:PozA2n9dH5M2vkm0aFRv3pId9RU9hvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZrV:Po1Avh1X/P

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 0671204843d2df3f7ec445bcabdf709f1628740b3d2b0e139e7bbc651844ed5d