0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 CA 88 44 24 2B 88 44 24 2F B0 5F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
0.0.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 CA 88 44 24 2B 88 44 24 2F B0 5F 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1df:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d251:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d36d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d449:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d56f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3742c:$s2: GetPrivateProfileString
- 0x3a5c1:$s3: get_OSFullName
- 0x37a2d:$s5: remove_Key
- 0x37a4d:$s5: remove_Key
- 0x3aa36:$s6: FtpWebRequest
- 0x3d1c1:$s7: logins
- 0x3d733:$s7: logins
- 0x40444:$s7: logins
- 0x404f6:$s7: logins
- 0x434be:$s7: logins
- 0x4109a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1df:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d251:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d36d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d449:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d56f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3742c:$s2: GetPrivateProfileString
- 0x3a5c1:$s3: get_OSFullName
- 0x37a2d:$s5: remove_Key
- 0x37a4d:$s5: remove_Key
- 0x3aa36:$s6: FtpWebRequest
- 0x3d1c1:$s7: logins
- 0x3d733:$s7: logins
- 0x40444:$s7: logins
- 0x404f6:$s7: logins
- 0x434be:$s7: logins
- 0x4109a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0c7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e139:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1c3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e255:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e331:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e457:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x38314:$s2: GetPrivateProfileString
- 0x3b4a9:$s3: get_OSFullName
- 0x38915:$s5: remove_Key
- 0x38935:$s5: remove_Key
- 0x3b91e:$s6: FtpWebRequest
- 0x3e0a9:$s7: logins
- 0x3e61b:$s7: logins
- 0x4132c:$s7: logins
- 0x413de:$s7: logins
- 0x443a6:$s7: logins
- 0x41f82:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1df:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d251:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d36d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d449:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d56f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3742c:$s2: GetPrivateProfileString
- 0x3a5c1:$s3: get_OSFullName
- 0x37a2d:$s5: remove_Key
- 0x37a4d:$s5: remove_Key
- 0x3aa36:$s6: FtpWebRequest
- 0x3d1c1:$s7: logins
- 0x3d733:$s7: logins
- 0x40444:$s7: logins
- 0x404f6:$s7: logins
- 0x434be:$s7: logins
- 0x4109a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fec7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff39:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffc3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40055:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40131:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40257:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a114:$s2: GetPrivateProfileString
- 0x3d2a9:$s3: get_OSFullName
- 0x3a715:$s5: remove_Key
- 0x3a735:$s5: remove_Key
- 0x3d71e:$s6: FtpWebRequest
- 0x3fea9:$s7: logins
- 0x4041b:$s7: logins
- 0x4312c:$s7: logins
- 0x431de:$s7: logins
- 0x461a6:$s7: logins
- 0x43d82:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3efdf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f051:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f16d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f249:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f36f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0ee8.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3922c:$s2: GetPrivateProfileString
- 0x3c3c1:$s3: get_OSFullName
- 0x3982d:$s5: remove_Key
- 0x3984d:$s5: remove_Key
- 0x3c836:$s6: FtpWebRequest
- 0x3efc1:$s7: logins
- 0x3f533:$s7: logins
- 0x42244:$s7: logins
- 0x422f6:$s7: logins
- 0x452be:$s7: logins
- 0x42e9a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fec7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff39:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffc3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40055:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40131:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40257:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a114:$s2: GetPrivateProfileString
- 0x3d2a9:$s3: get_OSFullName
- 0x3a715:$s5: remove_Key
- 0x3a735:$s5: remove_Key
- 0x3d71e:$s6: FtpWebRequest
- 0x3fea9:$s7: logins
- 0x4041b:$s7: logins
- 0x4312c:$s7: logins
- 0x431de:$s7: logins
- 0x461a6:$s7: logins
- 0x43d82:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0c7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e139:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1c3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e255:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e331:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e457:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211ecee.1.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x38314:$s2: GetPrivateProfileString
- 0x3b4a9:$s3: get_OSFullName
- 0x38915:$s5: remove_Key
- 0x38935:$s5: remove_Key
- 0x3b91e:$s6: FtpWebRequest
- 0x3e0a9:$s7: logins
- 0x3e61b:$s7: logins
- 0x4132c:$s7: logins
- 0x413de:$s7: logins
- 0x443a6:$s7: logins
- 0x41f82:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1df:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d251:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d36d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d449:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d56f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3742c:$s2: GetPrivateProfileString
- 0x3a5c1:$s3: get_OSFullName
- 0x37a2d:$s5: remove_Key
- 0x37a4d:$s5: remove_Key
- 0x3aa36:$s6: FtpWebRequest
- 0x3d1c1:$s7: logins
- 0x3d733:$s7: logins
- 0x40444:$s7: logins
- 0x404f6:$s7: logins
- 0x434be:$s7: logins
- 0x4109a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0c7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e139:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1c3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e255:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e331:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e457:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.24d0000.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x38314:$s2: GetPrivateProfileString
- 0x3b4a9:$s3: get_OSFullName
- 0x38915:$s5: remove_Key
- 0x38935:$s5: remove_Key
- 0x3b91e:$s6: FtpWebRequest
- 0x3e0a9:$s7: logins
- 0x3e61b:$s7: logins
- 0x4132c:$s7: logins
- 0x413de:$s7: logins
- 0x443a6:$s7: logins
- 0x41f82:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3efdf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f051:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f16d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f249:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f36f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3592b90.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3922c:$s2: GetPrivateProfileString
- 0x3c3c1:$s3: get_OSFullName
- 0x3982d:$s5: remove_Key
- 0x3984d:$s5: remove_Key
- 0x3c836:$s6: FtpWebRequest
- 0x3efc1:$s7: logins
- 0x3f533:$s7: logins
- 0x42244:$s7: logins
- 0x422f6:$s7: logins
- 0x452be:$s7: logins
- 0x42e9a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1df:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d251:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d36d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d449:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d56f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3742c:$s2: GetPrivateProfileString
- 0x3a5c1:$s3: get_OSFullName
- 0x37a2d:$s5: remove_Key
- 0x37a4d:$s5: remove_Key
- 0x3aa36:$s6: FtpWebRequest
- 0x3d1c1:$s7: logins
- 0x3d733:$s7: logins
- 0x40444:$s7: logins
- 0x404f6:$s7: logins
- 0x434be:$s7: logins
- 0x4109a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3efdf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8b717:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f051:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8b789:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8b813:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f16d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8b8a5:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8b90f:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f249:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8b981:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8ba17:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f36f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8baa7:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3546458.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3922c:$s2: GetPrivateProfileString
- 0x85964:$s2: GetPrivateProfileString
- 0x3c3c1:$s3: get_OSFullName
- 0x88af9:$s3: get_OSFullName
- 0x3982d:$s5: remove_Key
- 0x3984d:$s5: remove_Key
- 0x85f65:$s5: remove_Key
- 0x85f85:$s5: remove_Key
- 0x3c836:$s6: FtpWebRequest
- 0x88f6e:$s6: FtpWebRequest
- 0x3efc1:$s7: logins
- 0x3f533:$s7: logins
- 0x42244:$s7: logins
- 0x422f6:$s7: logins
- 0x452be:$s7: logins
- 0x8b6f9:$s7: logins
- 0x8bc6b:$s7: logins
- 0x8e97c:$s7: logins
- 0x8ea2e:$s7: logins
- 0x919f6:$s7: logins
- 0x42e9a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3efdf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f051:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f16d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f249:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f36f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.211fbd6.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3922c:$s2: GetPrivateProfileString
- 0x3c3c1:$s3: get_OSFullName
- 0x3982d:$s5: remove_Key
- 0x3984d:$s5: remove_Key
- 0x3c836:$s6: FtpWebRequest
- 0x3efc1:$s7: logins
- 0x3f533:$s7: logins
- 0x42244:$s7: logins
- 0x422f6:$s7: logins
- 0x452be:$s7: logins
- 0x42e9a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3efdf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f051:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0db:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f16d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1d7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f249:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2df:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f36f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.4b20000.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3922c:$s2: GetPrivateProfileString
- 0x3c3c1:$s3: get_OSFullName
- 0x3982d:$s5: remove_Key
- 0x3984d:$s5: remove_Key
- 0x3c836:$s6: FtpWebRequest
- 0x3efc1:$s7: logins
- 0x3f533:$s7: logins
- 0x42244:$s7: logins
- 0x422f6:$s7: logins
- 0x452be:$s7: logins
- 0x42e9a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fec7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8c5ff:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff39:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8c671:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffc3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8c6fb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40055:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8c78d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400bf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8c7f7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40131:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8c869:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401c7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8c8ff:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40257:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8c98f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exe.3545570.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a114:$s2: GetPrivateProfileString
- 0x8684c:$s2: GetPrivateProfileString
- 0x3d2a9:$s3: get_OSFullName
- 0x899e1:$s3: get_OSFullName
- 0x3a715:$s5: remove_Key
- 0x3a735:$s5: remove_Key
- 0x86e4d:$s5: remove_Key
- 0x86e6d:$s5: remove_Key
- 0x3d71e:$s6: FtpWebRequest
- 0x89e56:$s6: FtpWebRequest
- 0x3fea9:$s7: logins
- 0x4041b:$s7: logins
- 0x4312c:$s7: logins
- 0x431de:$s7: logins
- 0x461a6:$s7: logins
- 0x8c5e1:$s7: logins
- 0x8cb53:$s7: logins
- 0x8f864:$s7: logins
- 0x8f916:$s7: logins
- 0x928de:$s7: logins
- 0x43d82:$s9: 1.85 (Hash, version 2, native byte-order)
|
Click to see the 77 entries |