General

  • Target

    240325-bhncjseg5x

  • Size

    486KB

  • MD5

    a585fc57f4ea8fc2a275447401a05246

  • SHA1

    338d9e0241a54ea2c32f44378684881083ca7661

  • SHA256

    623a5ea08484838a6b750977967f8b8808efda37831e33cea789f6a38a56e70f

  • SHA512

    6deabcd6fa3be524a4cd570755f97b888ab55cbbe8e8bc7d1773d2406a527a2e21b97446f2aeeadf68e524af26338f2c431659321ca5d5d46f39f953a1e741f1

  • SSDEEP

    3072:dVnNs48OW0kT97kFUxj3mKMABR3R7DyWvEXNemiS0KPMID5whT0bMNj69wrVRs3B:/bkw83zLJtMtwmIj6ERCcXhwB

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables referencing credit card regular expressions 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • ModiLoader Second Stage 1 IoCs
  • Modiloader family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 240325-bhncjseg5x
    .js