General

  • Target

    f44cf97befe96a9113776f0200157c58fcf58c9a533b87ec33744e9ebc276002

  • Size

    3.5MB

  • MD5

    db3385f280779a27183af248f4a1f093

  • SHA1

    1bddf8e0906e25905542f10d655bccf3a76b1f80

  • SHA256

    f44cf97befe96a9113776f0200157c58fcf58c9a533b87ec33744e9ebc276002

  • SHA512

    36654a6017f3d913d1004fd6e2cc8c63fc8b6095042fd9bd848ca7fcaad5bb2293d73b2b2feb8def3359c1ba75d72d1c92b361a69edb578e31fe53b47ab0347d

  • SSDEEP

    12288:Ef7cVSgE29xxspm0n1vuz379cvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZstqmjZ:EfWdh1Xu

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • f44cf97befe96a9113776f0200157c58fcf58c9a533b87ec33744e9ebc276002