1.2.RegSvcs.exe.400000.0.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 BA 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
1.2.RegSvcs.exe.400000.0.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x1300:$s3: 83 EC 38 53 B0 BA 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1fdd0:$s5: delete[]
- 0x1f288:$s6: constructor or from DllMain.
|
1.2.RegSvcs.exe.5280ee8.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1fb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d26d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d389:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d465:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d58b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5280ee8.6.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x37335:$s2: GetPrivateProfileString
- 0x3a5a7:$s3: get_OSFullName
- 0x37942:$s5: remove_Key
- 0x37962:$s5: remove_Key
- 0x3aa16:$s6: FtpWebRequest
- 0x3d1dd:$s7: logins
- 0x3d74f:$s7: logins
- 0x40432:$s7: logins
- 0x40512:$s7: logins
- 0x434ce:$s7: logins
- 0x410ac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.5280000.7.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5280000.7.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5280000.7.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5280000.7.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0e3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e155:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1df:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e271:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e34d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e473:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5280000.7.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3821d:$s2: GetPrivateProfileString
- 0x3b48f:$s3: get_OSFullName
- 0x3882a:$s5: remove_Key
- 0x3884a:$s5: remove_Key
- 0x3b8fe:$s6: FtpWebRequest
- 0x3e0c5:$s7: logins
- 0x3e637:$s7: logins
- 0x4131a:$s7: logins
- 0x413fa:$s7: logins
- 0x443b6:$s7: logins
- 0x41f94:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.2a3ed6e.1.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fee3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff55:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffdf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40071:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4014d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40273:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.2a3ed6e.1.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a01d:$s2: GetPrivateProfileString
- 0x3d28f:$s3: get_OSFullName
- 0x3a62a:$s5: remove_Key
- 0x3a64a:$s5: remove_Key
- 0x3d6fe:$s6: FtpWebRequest
- 0x3fec5:$s7: logins
- 0x40437:$s7: logins
- 0x4311a:$s7: logins
- 0x431fa:$s7: logins
- 0x461b6:$s7: logins
- 0x43d94:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3e22b90.3.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1fb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d26d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d389:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d465:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d58b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3e22b90.3.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x37335:$s2: GetPrivateProfileString
- 0x3a5a7:$s3: get_OSFullName
- 0x37942:$s5: remove_Key
- 0x37962:$s5: remove_Key
- 0x3aa16:$s6: FtpWebRequest
- 0x3d1dd:$s7: logins
- 0x3d74f:$s7: logins
- 0x40432:$s7: logins
- 0x40512:$s7: logins
- 0x434ce:$s7: logins
- 0x410ac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.5310000.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5310000.8.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5310000.8.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5310000.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3effb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f06d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f189:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f265:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f38b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5310000.8.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39135:$s2: GetPrivateProfileString
- 0x3c3a7:$s3: get_OSFullName
- 0x39742:$s5: remove_Key
- 0x39762:$s5: remove_Key
- 0x3c816:$s6: FtpWebRequest
- 0x3efdd:$s7: logins
- 0x3f54f:$s7: logins
- 0x42232:$s7: logins
- 0x42312:$s7: logins
- 0x452ce:$s7: logins
- 0x42eac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3dd6458.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1fb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d26d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d389:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d465:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d58b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3dd6458.4.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x37335:$s2: GetPrivateProfileString
- 0x3a5a7:$s3: get_OSFullName
- 0x37942:$s5: remove_Key
- 0x37962:$s5: remove_Key
- 0x3aa16:$s6: FtpWebRequest
- 0x3d1dd:$s7: logins
- 0x3d74f:$s7: logins
- 0x40432:$s7: logins
- 0x40512:$s7: logins
- 0x434ce:$s7: logins
- 0x410ac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.5310000.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5310000.8.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5310000.8.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5310000.8.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1fb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d26d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d389:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d465:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d58b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5310000.8.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x37335:$s2: GetPrivateProfileString
- 0x3a5a7:$s3: get_OSFullName
- 0x37942:$s5: remove_Key
- 0x37962:$s5: remove_Key
- 0x3aa16:$s6: FtpWebRequest
- 0x3d1dd:$s7: logins
- 0x3d74f:$s7: logins
- 0x40432:$s7: logins
- 0x40512:$s7: logins
- 0x434ce:$s7: logins
- 0x410ac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3e22b90.3.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3e22b90.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3effb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f06d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f189:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f265:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f38b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3e22b90.3.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39135:$s2: GetPrivateProfileString
- 0x3c3a7:$s3: get_OSFullName
- 0x39742:$s5: remove_Key
- 0x39762:$s5: remove_Key
- 0x3c816:$s6: FtpWebRequest
- 0x3efdd:$s7: logins
- 0x3f54f:$s7: logins
- 0x42232:$s7: logins
- 0x42312:$s7: logins
- 0x452ce:$s7: logins
- 0x42eac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.2a3ed6e.1.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3ed6e.1.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0e3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e155:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1df:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e271:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e34d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e473:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.2a3ed6e.1.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3821d:$s2: GetPrivateProfileString
- 0x3b48f:$s3: get_OSFullName
- 0x3882a:$s5: remove_Key
- 0x3884a:$s5: remove_Key
- 0x3b8fe:$s6: FtpWebRequest
- 0x3e0c5:$s7: logins
- 0x3e637:$s7: logins
- 0x4131a:$s7: logins
- 0x413fa:$s7: logins
- 0x443b6:$s7: logins
- 0x41f94:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.2a3fc56.2.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3d1fb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3d26d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3d2f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3d389:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3d3f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3d465:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3d4fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3d58b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.2a3fc56.2.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x37335:$s2: GetPrivateProfileString
- 0x3a5a7:$s3: get_OSFullName
- 0x37942:$s5: remove_Key
- 0x37962:$s5: remove_Key
- 0x3aa16:$s6: FtpWebRequest
- 0x3d1dd:$s7: logins
- 0x3d74f:$s7: logins
- 0x40432:$s7: logins
- 0x40512:$s7: logins
- 0x434ce:$s7: logins
- 0x410ac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.2a3fc56.2.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.2a3fc56.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3effb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f06d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f189:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f265:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f38b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.2a3fc56.2.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39135:$s2: GetPrivateProfileString
- 0x3c3a7:$s3: get_OSFullName
- 0x39742:$s5: remove_Key
- 0x39762:$s5: remove_Key
- 0x3c816:$s6: FtpWebRequest
- 0x3efdd:$s7: logins
- 0x3f54f:$s7: logins
- 0x42232:$s7: logins
- 0x42312:$s7: logins
- 0x452ce:$s7: logins
- 0x42eac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3dd5570.5.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3e0e3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3e155:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3e1df:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3e271:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3e2db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3e34d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3e3e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3e473:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3dd5570.5.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3821d:$s2: GetPrivateProfileString
- 0x3b48f:$s3: get_OSFullName
- 0x3882a:$s5: remove_Key
- 0x3884a:$s5: remove_Key
- 0x3b8fe:$s6: FtpWebRequest
- 0x3e0c5:$s7: logins
- 0x3e637:$s7: logins
- 0x4131a:$s7: logins
- 0x413fa:$s7: logins
- 0x443b6:$s7: logins
- 0x41f94:$s9: 1.85 (Hash, version 2, native byte-order)
|
0.2.25EAU0258.pdf.bat.exe.38f0000.1.raw.unpack | MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen | - 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
- 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
- 0x700:$s3: 83 EC 38 53 B0 BA 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
- 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
- 0x1e9d0:$s5: delete[]
- 0x1de88:$s6: constructor or from DllMain.
|
1.2.RegSvcs.exe.5280000.7.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5280000.7.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5280000.7.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5280000.7.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fee3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff55:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffdf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40071:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4014d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40273:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5280000.7.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a01d:$s2: GetPrivateProfileString
- 0x3d28f:$s3: get_OSFullName
- 0x3a62a:$s5: remove_Key
- 0x3a64a:$s5: remove_Key
- 0x3d6fe:$s6: FtpWebRequest
- 0x3fec5:$s7: logins
- 0x40437:$s7: logins
- 0x4311a:$s7: logins
- 0x431fa:$s7: logins
- 0x461b6:$s7: logins
- 0x43d94:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.5280ee8.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.5280ee8.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3effb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f06d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f189:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f265:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f38b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.5280ee8.6.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39135:$s2: GetPrivateProfileString
- 0x3c3a7:$s3: get_OSFullName
- 0x39742:$s5: remove_Key
- 0x39762:$s5: remove_Key
- 0x3c816:$s6: FtpWebRequest
- 0x3efdd:$s7: logins
- 0x3f54f:$s7: logins
- 0x42232:$s7: logins
- 0x42312:$s7: logins
- 0x452ce:$s7: logins
- 0x42eac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3dd6458.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd6458.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3effb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8b733:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3f06d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8b7a5:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3f0f7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8b82f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3f189:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8b8c1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3f1f3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8b92b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3f265:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8b99d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3f2fb:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8ba33:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3f38b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8bac3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3dd6458.4.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x39135:$s2: GetPrivateProfileString
- 0x8586d:$s2: GetPrivateProfileString
- 0x3c3a7:$s3: get_OSFullName
- 0x88adf:$s3: get_OSFullName
- 0x39742:$s5: remove_Key
- 0x39762:$s5: remove_Key
- 0x85e7a:$s5: remove_Key
- 0x85e9a:$s5: remove_Key
- 0x3c816:$s6: FtpWebRequest
- 0x88f4e:$s6: FtpWebRequest
- 0x3efdd:$s7: logins
- 0x3f54f:$s7: logins
- 0x42232:$s7: logins
- 0x42312:$s7: logins
- 0x452ce:$s7: logins
- 0x8b715:$s7: logins
- 0x8bc87:$s7: logins
- 0x8e96a:$s7: logins
- 0x8ea4a:$s7: logins
- 0x91a06:$s7: logins
- 0x42eac:$s9: 1.85 (Hash, version 2, native byte-order)
|
1.2.RegSvcs.exe.3dd5570.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.raw.unpack | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
1.2.RegSvcs.exe.3dd5570.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3fee3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x8c61b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3ff55:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x8c68d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3ffdf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x8c717:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x40071:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x8c7a9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x400db:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x8c813:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4014d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x8c885:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x401e3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x8c91b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x40273:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x8c9ab:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
1.2.RegSvcs.exe.3dd5570.5.raw.unpack | MALWARE_Win_AgentTeslaV2 | AgenetTesla Type 2 Keylogger payload | ditekSHen | - 0x3a01d:$s2: GetPrivateProfileString
- 0x86755:$s2: GetPrivateProfileString
- 0x3d28f:$s3: get_OSFullName
- 0x899c7:$s3: get_OSFullName
- 0x3a62a:$s5: remove_Key
- 0x3a64a:$s5: remove_Key
- 0x86d62:$s5: remove_Key
- 0x86d82:$s5: remove_Key
- 0x3d6fe:$s6: FtpWebRequest
- 0x89e36:$s6: FtpWebRequest
- 0x3fec5:$s7: logins
- 0x40437:$s7: logins
- 0x4311a:$s7: logins
- 0x431fa:$s7: logins
- 0x461b6:$s7: logins
- 0x8c5fd:$s7: logins
- 0x8cb6f:$s7: logins
- 0x8f852:$s7: logins
- 0x8f932:$s7: logins
- 0x928ee:$s7: logins
- 0x43d94:$s9: 1.85 (Hash, version 2, native byte-order)
|
Click to see the 78 entries |