9.1.rwmbmyrA.pif.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
7.2.rwmbmyrA.pif.1da65390.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da65390.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
12.2.rwmbmyrA.pif.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
9.2.rwmbmyrA.pif.3317fe86.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.3317fe86.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1da65390.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da65390.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da65390.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.33590000.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33590000.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.3.rwmbmyrA.pif.1ac96d68.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.3.rwmbmyrA.pif.1ac96d68.0.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.1.rwmbmyrA.pif.400000.1.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
7.2.rwmbmyrA.pif.400000.1.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
9.2.rwmbmyrA.pif.34625570.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34625570.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.31f60d8e.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.31f60d8e.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.34675390.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34675390.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.34660000.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34660000.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.331e5570.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.331e5570.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1da15570.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da15570.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.33590f08.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33590f08.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.33180d8e.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33180d8e.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.3.rwmbmyrA.pif.3157e9d0.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.3.rwmbmyrA.pif.3157e9d0.0.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.400000.1.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
9.2.rwmbmyrA.pif.35ba0000.9.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.35ba0000.9.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1c700d8e.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1c700d8e.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.3317fe86.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.3317fe86.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.3317fe86.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.3.rwmbmyrA.pif.3157e9d0.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.3.rwmbmyrA.pif.3157e9d0.0.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.3.rwmbmyrA.pif.3157e9d0.0.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.33235390.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.33235390.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.31f60d8e.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f60d8e.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.31f60d8e.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.31f5fe86.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.31f5fe86.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.3.rwmbmyrA.pif.1ac96d68.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.3.rwmbmyrA.pif.1ac96d68.0.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.3.rwmbmyrA.pif.1ac96d68.0.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.3.rwmbmyrA.pif.304a08f8.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.3.rwmbmyrA.pif.304a08f8.0.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.1.rwmbmyrA.pif.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
12.2.rwmbmyrA.pif.34660f08.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34660f08.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1f740000.9.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1f740000.9.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1eeb0000.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1eeb0000.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.33235390.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.33235390.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.33235390.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
7.2.rwmbmyrA.pif.1f740000.9.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1f740000.9.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1f740000.9.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.D9876543456780000.exe.28a0000.1.unpack | JoeSecurity_DBatLoader | Yara detected DBatLoader | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33180d8e.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33180d8e.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.31f5fe86.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.31f5fe86.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.31f5fe86.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1da16478.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x90201:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x90273:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x902fd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x9038f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x903f9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x9046b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x90501:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x90591:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da16478.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x8a0ab:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x8d395:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x8a84b:$s5: remove_Key
- 0x8a86b:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x8d7f0:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x901e3:$s7: logins
- 0x90755:$s7: logins
- 0x93438:$s7: logins
- 0x93518:$s7: logins
- 0x965e6:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1da16478.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da16478.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da16478.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.331e6478.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e6478.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.331e6478.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.3.rwmbmyrA.pif.304a08f8.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.3.rwmbmyrA.pif.304a08f8.0.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.34625570.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34625570.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x91109:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x9117b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x91205:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x91297:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x91301:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x91373:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x91409:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x91499:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34625570.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x8afb3:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x8e29d:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x8b753:$s5: remove_Key
- 0x8b773:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x8e6f8:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x910eb:$s7: logins
- 0x9165d:$s7: logins
- 0x94340:$s7: logins
- 0x94420:$s7: logins
- 0x974ee:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.331e6478.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x90201:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x90273:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x902fd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x9038f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x903f9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x9046b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x90501:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x90591:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.331e6478.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x8a0ab:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x8d395:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x8a84b:$s5: remove_Key
- 0x8a86b:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x8d7f0:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x901e3:$s7: logins
- 0x90755:$s7: logins
- 0x93438:$s7: logins
- 0x93518:$s7: logins
- 0x965e6:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1eeb0f08.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1eeb0f08.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.34626478.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34626478.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.D9876543456780000.exe.234de48.0.unpack | JoeSecurity_DBatLoader | Yara detected DBatLoader | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1c6ffe86.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
7.2.rwmbmyrA.pif.1c6ffe86.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c6ffe86.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1c6ffe86.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.331e6478.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e6478.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.331e6478.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e6478.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.331e6478.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.1.rwmbmyrA.pif.400000.1.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
0.2.D9876543456780000.exe.234de48.0.raw.unpack | JoeSecurity_DBatLoader | Yara detected DBatLoader | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1da15570.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x91109:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x9117b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x91205:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x91297:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x91301:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x91373:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x91409:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x91499:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1da15570.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x8afb3:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x8e29d:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x8b753:$s5: remove_Key
- 0x8b773:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x8e6f8:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x910eb:$s7: logins
- 0x9165d:$s7: logins
- 0x94340:$s7: logins
- 0x94420:$s7: logins
- 0x974ee:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.35ba0000.9.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.35ba0000.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.35ba0000.9.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1eeb0000.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0000.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1eeb0000.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
7.2.rwmbmyrA.pif.1eeb0f08.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1eeb0f08.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1eeb0f08.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.1.rwmbmyrA.pif.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
7.2.rwmbmyrA.pif.1c700d8e.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
7.2.rwmbmyrA.pif.1c700d8e.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
7.2.rwmbmyrA.pif.1c700d8e.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.33590000.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590000.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x403f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x40463:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x404ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4057f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x405e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4065b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x406f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40781:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33590000.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a29b:$s2: GetPrivateProfileString
- 0x3d585:$s3: get_OSFullName
- 0x3aa3b:$s5: remove_Key
- 0x3aa5b:$s5: remove_Key
- 0x3d9e0:$s6: FtpWebRequest
- 0x403d3:$s7: logins
- 0x40945:$s7: logins
- 0x43628:$s7: logins
- 0x43708:$s7: logins
- 0x467d6:$s7: logins
- 0x442a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.33590f08.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.33590f08.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.33590f08.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.1.rwmbmyrA.pif.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 AF 88 44 24 2B 88 44 24 2F B0 73 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
12.2.rwmbmyrA.pif.34660f08.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660f08.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34660f08.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.34700000.9.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34700000.9.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.34675390.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34675390.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34675390.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.34700000.9.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34700000.9.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3f4e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f55b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f5e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f6e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f7e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34700000.9.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39393:$s2: GetPrivateProfileString
- 0x3c67d:$s3: get_OSFullName
- 0x39b33:$s5: remove_Key
- 0x39b53:$s5: remove_Key
- 0x3cad8:$s6: FtpWebRequest
- 0x3f4cb:$s7: logins
- 0x3fa3d:$s7: logins
- 0x42720:$s7: logins
- 0x42800:$s7: logins
- 0x458ce:$s7: logins
- 0x4339a:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.34660000.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.34660000.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.34660000.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
12.2.rwmbmyrA.pif.331e5570.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
12.2.rwmbmyrA.pif.331e5570.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x421f1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x91109:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x42263:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x9117b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x422ed:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x91205:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4237f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x91297:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x423e9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x91301:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4245b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x91373:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x424f1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x91409:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x42581:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x91499:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
12.2.rwmbmyrA.pif.331e5570.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3c09b:$s2: GetPrivateProfileString
- 0x8afb3:$s2: GetPrivateProfileString
- 0x3f385:$s3: get_OSFullName
- 0x8e29d:$s3: get_OSFullName
- 0x3c83b:$s5: remove_Key
- 0x3c85b:$s5: remove_Key
- 0x8b753:$s5: remove_Key
- 0x8b773:$s5: remove_Key
- 0x3f7e0:$s6: FtpWebRequest
- 0x8e6f8:$s6: FtpWebRequest
- 0x421d3:$s7: logins
- 0x42745:$s7: logins
- 0x45428:$s7: logins
- 0x45508:$s7: logins
- 0x485d6:$s7: logins
- 0x910eb:$s7: logins
- 0x9165d:$s7: logins
- 0x94340:$s7: logins
- 0x94420:$s7: logins
- 0x974ee:$s7: logins
- 0x460a2:$s9: 1.85 (Hash, version 2, native byte-order)
|
9.2.rwmbmyrA.pif.34626478.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
9.2.rwmbmyrA.pif.34626478.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x412e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x90201:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4135b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x90273:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x413e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x902fd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x41477:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x9038f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x414e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x903f9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x41553:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x9046b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x415e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x90501:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x41679:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x90591:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
9.2.rwmbmyrA.pif.34626478.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3b193:$s2: GetPrivateProfileString
- 0x8a0ab:$s2: GetPrivateProfileString
- 0x3e47d:$s3: get_OSFullName
- 0x8d395:$s3: get_OSFullName
- 0x3b933:$s5: remove_Key
- 0x3b953:$s5: remove_Key
- 0x8a84b:$s5: remove_Key
- 0x8a86b:$s5: remove_Key
- 0x3e8d8:$s6: FtpWebRequest
- 0x8d7f0:$s6: FtpWebRequest
- 0x412cb:$s7: logins
- 0x4183d:$s7: logins
- 0x44520:$s7: logins
- 0x44600:$s7: logins
- 0x476ce:$s7: logins
- 0x901e3:$s7: logins
- 0x90755:$s7: logins
- 0x93438:$s7: logins
- 0x93518:$s7: logins
- 0x965e6:$s7: logins
- 0x4519a:$s9: 1.85 (Hash, version 2, native byte-order)
|
Click to see the 280 entries |