General

  • Target

    95d753829083b4522ed9ff8fd9d6c8c6728cba4180ec9ccc0265398c271f6001

  • Size

    3.6MB

  • MD5

    cf7a47eed27f343b17a8821eaa0ffc42

  • SHA1

    7b330765bd74aeb7969d398f7e5139943db03ce6

  • SHA256

    95d753829083b4522ed9ff8fd9d6c8c6728cba4180ec9ccc0265398c271f6001

  • SHA512

    2986f5c6aa9209593f4ccbfc9f1cd26f379f17acd63d06695c24fc3064332b8f38e16deee0a0cc2b2e7f6cd9b7c6c8d5cde0d3c9cf296fd297dda0907a2e6892

  • SSDEEP

    12288:VozA2n9dH5M2vkm0aFRv3pId9Ry9vvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZNF:VoNWvh1X/X

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • DarkTrack payload 1 IoCs
  • Darkcomet family
  • Darktrack family
  • Detect LockFile payload 1 IoCs
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Surtr Payload 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Lockfile family
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • M00nd3v_logger family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Mountlocker family
  • Shurk Stealer payload 1 IoCs
  • Shurk family
  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Surtr family
  • Vulturi family
  • Vulturi payload 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 95d753829083b4522ed9ff8fd9d6c8c6728cba4180ec9ccc0265398c271f6001