6.2.RegSvcs.exe.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 6B 88 44 24 2B 88 44 24 2F B0 59 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
6.2.RegSvcs.exe.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 6B 88 44 24 2B 88 44 24 2F B0 59 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
6.2.RegSvcs.exe.2ed064e.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e9f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ea63:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3eaed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3eb7f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3ebe9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3ec5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3ecf1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3ed81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.2ed064e.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3880b:$s2: GetPrivateProfileString
- 0x3bb53:$s3: get_OSFullName
- 0x38fb9:$s5: remove_Key
- 0x38fd9:$s5: remove_Key
- 0x3bfda:$s6: FtpWebRequest
- 0x3e9d3:$s7: logins
- 0x3ef45:$s7: logins
- 0x41c28:$s7: logins
- 0x41d08:$s7: logins
- 0x44dc6:$s7: logins
- 0x428a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
5.2.x.exe.2f40000.1.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 6B 88 44 24 2B 88 44 24 2F B0 59 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
6.2.RegSvcs.exe.5730000.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5730000.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5730000.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5730000.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e9f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ea63:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3eaed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3eb7f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3ebe9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3ec5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3ecf1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3ed81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5730000.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3880b:$s2: GetPrivateProfileString
- 0x3bb53:$s3: get_OSFullName
- 0x38fb9:$s5: remove_Key
- 0x38fd9:$s5: remove_Key
- 0x3bfda:$s6: FtpWebRequest
- 0x3e9d3:$s7: logins
- 0x3ef45:$s7: logins
- 0x41c28:$s7: logins
- 0x41d08:$s7: logins
- 0x44dc6:$s7: logins
- 0x428a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x416d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4174b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x417d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41867:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x418d1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41943:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x419d9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41a69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.2ecf766.1.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b4f3:$s2: GetPrivateProfileString
- 0x3e83b:$s3: get_OSFullName
- 0x3bca1:$s5: remove_Key
- 0x3bcc1:$s5: remove_Key
- 0x3ecc2:$s6: FtpWebRequest
- 0x416bb:$s7: logins
- 0x41c2d:$s7: logins
- 0x44910:$s7: logins
- 0x449f0:$s7: logins
- 0x47aae:$s7: logins
- 0x4558a:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.5730000.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5730000.6.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.5730000.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5730000.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5730000.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x407f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40863:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x408ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4097f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x409e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40a5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x40af1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40b81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5730000.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a60b:$s2: GetPrivateProfileString
- 0x3d953:$s3: get_OSFullName
- 0x3adb9:$s5: remove_Key
- 0x3add9:$s5: remove_Key
- 0x3ddda:$s6: FtpWebRequest
- 0x407d3:$s7: logins
- 0x40d45:$s7: logins
- 0x43a28:$s7: logins
- 0x43b08:$s7: logins
- 0x46bc6:$s7: logins
- 0x446a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.41a4590.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x407f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40863:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x408ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4097f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x409e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40a5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x40af1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40b81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.41a4590.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a60b:$s2: GetPrivateProfileString
- 0x3d953:$s3: get_OSFullName
- 0x3adb9:$s5: remove_Key
- 0x3add9:$s5: remove_Key
- 0x3ddda:$s6: FtpWebRequest
- 0x407d3:$s7: logins
- 0x40d45:$s7: logins
- 0x43a28:$s7: logins
- 0x43b08:$s7: logins
- 0x46bc6:$s7: logins
- 0x446a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x407f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40863:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x408ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4097f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x409e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40a5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x40af1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40b81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.2ed064e.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a60b:$s2: GetPrivateProfileString
- 0x3d953:$s3: get_OSFullName
- 0x3adb9:$s5: remove_Key
- 0x3add9:$s5: remove_Key
- 0x3ddda:$s6: FtpWebRequest
- 0x407d3:$s7: logins
- 0x40d45:$s7: logins
- 0x43a28:$s7: logins
- 0x43b08:$s7: logins
- 0x46bc6:$s7: logins
- 0x446a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x407f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40863:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x408ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4097f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x409e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40a5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x40af1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40b81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5930ee8.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a60b:$s2: GetPrivateProfileString
- 0x3d953:$s3: get_OSFullName
- 0x3adb9:$s5: remove_Key
- 0x3add9:$s5: remove_Key
- 0x3ddda:$s6: FtpWebRequest
- 0x407d3:$s7: logins
- 0x40d45:$s7: logins
- 0x43a28:$s7: logins
- 0x43b08:$s7: logins
- 0x46bc6:$s7: logins
- 0x446a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.5930000.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5930000.7.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.5930000.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5930000.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5930000.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x416d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4174b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x417d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41867:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x418d1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41943:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x419d9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41a69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5930000.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b4f3:$s2: GetPrivateProfileString
- 0x3e83b:$s3: get_OSFullName
- 0x3bca1:$s5: remove_Key
- 0x3bcc1:$s5: remove_Key
- 0x3ecc2:$s6: FtpWebRequest
- 0x416bb:$s7: logins
- 0x41c2d:$s7: logins
- 0x44910:$s7: logins
- 0x449f0:$s7: logins
- 0x47aae:$s7: logins
- 0x4558a:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.41a4590.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.41a4590.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e9f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ea63:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3eaed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3eb7f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3ebe9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3ec5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3ecf1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3ed81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.41a4590.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3880b:$s2: GetPrivateProfileString
- 0x3bb53:$s3: get_OSFullName
- 0x38fb9:$s5: remove_Key
- 0x38fd9:$s5: remove_Key
- 0x3bfda:$s6: FtpWebRequest
- 0x3e9d3:$s7: logins
- 0x3ef45:$s7: logins
- 0x41c28:$s7: logins
- 0x41d08:$s7: logins
- 0x44dc6:$s7: logins
- 0x428a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.5930ee8.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5930ee8.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e9f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ea63:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3eaed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3eb7f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3ebe9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3ec5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3ecf1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3ed81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5930ee8.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3880b:$s2: GetPrivateProfileString
- 0x3bb53:$s3: get_OSFullName
- 0x38fb9:$s5: remove_Key
- 0x38fd9:$s5: remove_Key
- 0x3bfda:$s6: FtpWebRequest
- 0x3e9d3:$s7: logins
- 0x3ef45:$s7: logins
- 0x41c28:$s7: logins
- 0x41d08:$s7: logins
- 0x44dc6:$s7: logins
- 0x428a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.4156458.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.4156458.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.4156458.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.4156458.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e9f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ea63:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3eaed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3eb7f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3ebe9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3ec5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3ecf1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3ed81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.4156458.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3880b:$s2: GetPrivateProfileString
- 0x3bb53:$s3: get_OSFullName
- 0x38fb9:$s5: remove_Key
- 0x38fd9:$s5: remove_Key
- 0x3bfda:$s6: FtpWebRequest
- 0x3e9d3:$s7: logins
- 0x3ef45:$s7: logins
- 0x41c28:$s7: logins
- 0x41d08:$s7: logins
- 0x44dc6:$s7: logins
- 0x428a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.5930000.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.5930000.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.5930000.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.5930000.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f8d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f94b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f9d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3fa67:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3fad1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3fb43:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3fbd9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3fc69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.5930000.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x396f3:$s2: GetPrivateProfileString
- 0x3ca3b:$s3: get_OSFullName
- 0x39ea1:$s5: remove_Key
- 0x39ec1:$s5: remove_Key
- 0x3cec2:$s6: FtpWebRequest
- 0x3f8bb:$s7: logins
- 0x3fe2d:$s7: logins
- 0x42b10:$s7: logins
- 0x42bf0:$s7: logins
- 0x45cae:$s7: logins
- 0x4378a:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.4156458.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.4156458.5.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.4156458.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.4156458.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.4156458.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x407f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8e929:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40863:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8e99b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x408ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8ea25:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4097f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8eab7:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x409e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8eb21:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x40a5b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8eb93:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x40af1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8ec29:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40b81:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8ecb9:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.4156458.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a60b:$s2: GetPrivateProfileString
- 0x88743:$s2: GetPrivateProfileString
- 0x3d953:$s3: get_OSFullName
- 0x8ba8b:$s3: get_OSFullName
- 0x3adb9:$s5: remove_Key
- 0x3add9:$s5: remove_Key
- 0x88ef1:$s5: remove_Key
- 0x88f11:$s5: remove_Key
- 0x3ddda:$s6: FtpWebRequest
- 0x8bf12:$s6: FtpWebRequest
- 0x407d3:$s7: logins
- 0x40d45:$s7: logins
- 0x43a28:$s7: logins
- 0x43b08:$s7: logins
- 0x46bc6:$s7: logins
- 0x8e90b:$s7: logins
- 0x8ee7d:$s7: logins
- 0x91b60:$s7: logins
- 0x91c40:$s7: logins
- 0x94cfe:$s7: logins
- 0x446a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.4155570.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.4155570.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.4155570.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.4155570.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f8d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f94b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f9d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3fa67:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3fad1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3fb43:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3fbd9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3fc69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.4155570.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x396f3:$s2: GetPrivateProfileString
- 0x3ca3b:$s3: get_OSFullName
- 0x39ea1:$s5: remove_Key
- 0x39ec1:$s5: remove_Key
- 0x3cec2:$s6: FtpWebRequest
- 0x3f8bb:$s7: logins
- 0x3fe2d:$s7: logins
- 0x42b10:$s7: logins
- 0x42bf0:$s7: logins
- 0x45cae:$s7: logins
- 0x4378a:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.4155570.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.4155570.3.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
6.2.RegSvcs.exe.4155570.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.4155570.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.4155570.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x416d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8f811:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4174b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8f883:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x417d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8f90d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41867:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8f99f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x418d1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8fa09:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41943:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8fa7b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x419d9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8fb11:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41a69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8fba1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.4155570.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b4f3:$s2: GetPrivateProfileString
- 0x8962b:$s2: GetPrivateProfileString
- 0x3e83b:$s3: get_OSFullName
- 0x8c973:$s3: get_OSFullName
- 0x3bca1:$s5: remove_Key
- 0x3bcc1:$s5: remove_Key
- 0x89dd9:$s5: remove_Key
- 0x89df9:$s5: remove_Key
- 0x3ecc2:$s6: FtpWebRequest
- 0x8cdfa:$s6: FtpWebRequest
- 0x416bb:$s7: logins
- 0x41c2d:$s7: logins
- 0x44910:$s7: logins
- 0x449f0:$s7: logins
- 0x47aae:$s7: logins
- 0x8f7f3:$s7: logins
- 0x8fd65:$s7: logins
- 0x92a48:$s7: logins
- 0x92b28:$s7: logins
- 0x95be6:$s7: logins
- 0x4558a:$s9: 1.85 (Hash, version 2, native byte-order)
|
6.2.RegSvcs.exe.2ecf766.1.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
6.2.RegSvcs.exe.2ecf766.1.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f8d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f94b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f9d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3fa67:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3fad1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3fb43:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3fbd9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3fc69:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
6.2.RegSvcs.exe.2ecf766.1.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x396f3:$s2: GetPrivateProfileString
- 0x3ca3b:$s3: get_OSFullName
- 0x39ea1:$s5: remove_Key
- 0x39ec1:$s5: remove_Key
- 0x3cec2:$s6: FtpWebRequest
- 0x3f8bb:$s7: logins
- 0x3fe2d:$s7: logins
- 0x42b10:$s7: logins
- 0x42bf0:$s7: logins
- 0x45cae:$s7: logins
- 0x4378a:$s9: 1.85 (Hash, version 2, native byte-order)
|
Click to see the 86 entries |