0.2.ADOC RFQ-WCMS-18097255.exe.7040000.12.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2439e:$s10: logins
- 0x23ed7:$s11: credential
- 0x20d94:$g1: get_Clipboard
- 0x20da2:$g2: get_Keyboard
- 0x20daf:$g3: get_Password
- 0x21f3d:$g4: get_CtrlKeyDown
- 0x21f4d:$g5: get_ShiftKeyDown
- 0x21f5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.7040000.12.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x20ce0:$a20: get_LastAccessed
- 0x22e05:$a30: set_GuidMasterKey
- 0x20d94:$a33: get_Clipboard
- 0x20da2:$a34: get_Keyboard
- 0x21f4d:$a35: get_ShiftKeyDown
- 0x21f5e:$a36: get_AltKeyDown
- 0x20daf:$a37: get_Password
- 0x217d3:$a38: get_PasswordHash
- 0x22656:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.3c61c80.6.raw.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2619e:$s10: logins
- 0x25cd7:$s11: credential
- 0x22b94:$g1: get_Clipboard
- 0x22ba2:$g2: get_Keyboard
- 0x22baf:$g3: get_Password
- 0x23d3d:$g4: get_CtrlKeyDown
- 0x23d4d:$g5: get_ShiftKeyDown
- 0x23d5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.3c61c80.6.raw.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x22ae0:$a20: get_LastAccessed
- 0x24c05:$a30: set_GuidMasterKey
- 0x22b94:$a33: get_Clipboard
- 0x22ba2:$a34: get_Keyboard
- 0x23d4d:$a35: get_ShiftKeyDown
- 0x23d5e:$a36: get_AltKeyDown
- 0x22baf:$a37: get_Password
- 0x235d3:$a38: get_PasswordHash
- 0x24456:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.3889930.3.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x4c3be:$s10: logins
- 0x4bef7:$s11: credential
- 0x48db4:$g1: get_Clipboard
- 0x48dc2:$g2: get_Keyboard
- 0x48dcf:$g3: get_Password
- 0x49f5d:$g4: get_CtrlKeyDown
- 0x49f6d:$g5: get_ShiftKeyDown
- 0x49f7e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.3889930.3.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x48d00:$a20: get_LastAccessed
- 0x4ae25:$a30: set_GuidMasterKey
- 0x48db4:$a33: get_Clipboard
- 0x48dc2:$a34: get_Keyboard
- 0x49f6d:$a35: get_ShiftKeyDown
- 0x49f7e:$a36: get_AltKeyDown
- 0x48dcf:$a37: get_Password
- 0x497f3:$a38: get_PasswordHash
- 0x4a676:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.7040000.12.raw.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2619e:$s10: logins
- 0x25cd7:$s11: credential
- 0x22b94:$g1: get_Clipboard
- 0x22ba2:$g2: get_Keyboard
- 0x22baf:$g3: get_Password
- 0x23d3d:$g4: get_CtrlKeyDown
- 0x23d4d:$g5: get_ShiftKeyDown
- 0x23d5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.7040000.12.raw.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x22ae0:$a20: get_LastAccessed
- 0x24c05:$a30: set_GuidMasterKey
- 0x22b94:$a33: get_Clipboard
- 0x22ba2:$a34: get_Keyboard
- 0x23d4d:$a35: get_ShiftKeyDown
- 0x23d5e:$a36: get_AltKeyDown
- 0x22baf:$a37: get_Password
- 0x235d3:$a38: get_PasswordHash
- 0x24456:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.3c61c80.6.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2439e:$s10: logins
- 0x23ed7:$s11: credential
- 0x20d94:$g1: get_Clipboard
- 0x20da2:$g2: get_Keyboard
- 0x20daf:$g3: get_Password
- 0x21f3d:$g4: get_CtrlKeyDown
- 0x21f4d:$g5: get_ShiftKeyDown
- 0x21f5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.3c61c80.6.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x20ce0:$a20: get_LastAccessed
- 0x22e05:$a30: set_GuidMasterKey
- 0x20d94:$a33: get_Clipboard
- 0x20da2:$a34: get_Keyboard
- 0x21f4d:$a35: get_ShiftKeyDown
- 0x21f5e:$a36: get_AltKeyDown
- 0x20daf:$a37: get_Password
- 0x217d3:$a38: get_PasswordHash
- 0x22656:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.38b1950.2.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2439e:$s10: logins
- 0x23ed7:$s11: credential
- 0x20d94:$g1: get_Clipboard
- 0x20da2:$g2: get_Keyboard
- 0x20daf:$g3: get_Password
- 0x21f3d:$g4: get_CtrlKeyDown
- 0x21f4d:$g5: get_ShiftKeyDown
- 0x21f5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.38b1950.2.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x20ce0:$a20: get_LastAccessed
- 0x22e05:$a30: set_GuidMasterKey
- 0x20d94:$a33: get_Clipboard
- 0x20da2:$a34: get_Keyboard
- 0x21f4d:$a35: get_ShiftKeyDown
- 0x21f5e:$a36: get_AltKeyDown
- 0x20daf:$a37: get_Password
- 0x217d3:$a38: get_PasswordHash
- 0x22656:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.2a5ddcc.1.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a5ddcc.1.raw.unpack | JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a5ddcc.1.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a5ddcc.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste | Detects executables potentially checking for WinJail sandbox window | ditekSHen | - 0x24eda:$v1: SbieDll.dll
- 0x2087a:$v2: USER
- 0x2090e:$v2: USER
- 0x24ef4:$v2: USER
- 0xfa07a:$v2: USER
- 0xfa102:$v2: USER
- 0xfa132:$v2: USER
- 0xfb7a2:$v2: USER
- 0xfb83a:$v2: USER
- 0xfb86a:$v2: USER
- 0x24f00:$v3: SANDBOX
- 0x24f12:$v4: VIRUS
- 0x24f62:$v4: VIRUS
- 0x24f20:$v5: MALWARE
- 0x24f32:$v6: SCHMIDTI
- 0x24f46:$v7: CURRENTUSER
|
0.2.ADOC RFQ-WCMS-18097255.exe.2a5ddcc.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0xf0d8:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x20198:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0xf10f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x20224:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0xf152:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x202c8:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0xf199:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x20374:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0xf1cc:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x20404:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0xf203:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x20490:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0xf24c:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x20540:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0xf292:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x205ec:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
0.2.ADOC RFQ-WCMS-18097255.exe.3889930.3.raw.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x4e1be:$s10: logins
- 0x4dcf7:$s11: credential
- 0x4abb4:$g1: get_Clipboard
- 0x4abc2:$g2: get_Keyboard
- 0x4abcf:$g3: get_Password
- 0x4bd5d:$g4: get_CtrlKeyDown
- 0x4bd6d:$g5: get_ShiftKeyDown
- 0x4bd7e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.3889930.3.raw.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x4ab00:$a20: get_LastAccessed
- 0x4cc25:$a30: set_GuidMasterKey
- 0x4abb4:$a33: get_Clipboard
- 0x4abc2:$a34: get_Keyboard
- 0x4bd6d:$a35: get_ShiftKeyDown
- 0x4bd7e:$a36: get_AltKeyDown
- 0x4abcf:$a37: get_Password
- 0x4b5f3:$a38: get_PasswordHash
- 0x4c476:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.38b1950.2.raw.unpack | MALWARE_Win_AgentTeslaV3 | AgentTeslaV3 infostealer payload | ditekSHen | - 0x2619e:$s10: logins
- 0x25cd7:$s11: credential
- 0x22b94:$g1: get_Clipboard
- 0x22ba2:$g2: get_Keyboard
- 0x22baf:$g3: get_Password
- 0x23d3d:$g4: get_CtrlKeyDown
- 0x23d4d:$g5: get_ShiftKeyDown
- 0x23d5e:$g6: get_AltKeyDown
|
0.2.ADOC RFQ-WCMS-18097255.exe.38b1950.2.raw.unpack | Windows_Trojan_AgentTesla_d3ac2b2f | unknown | unknown | - 0x22ae0:$a20: get_LastAccessed
- 0x24c05:$a30: set_GuidMasterKey
- 0x22b94:$a33: get_Clipboard
- 0x22ba2:$a34: get_Keyboard
- 0x23d4d:$a35: get_ShiftKeyDown
- 0x23d5e:$a36: get_AltKeyDown
- 0x22baf:$a37: get_Password
- 0x235d3:$a38: get_PasswordHash
- 0x24456:$a39: get_DefaultCredentials
|
0.2.ADOC RFQ-WCMS-18097255.exe.2a3096c.0.raw.unpack | JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a3096c.0.raw.unpack | JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a3096c.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.ADOC RFQ-WCMS-18097255.exe.2a3096c.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste | Detects executables potentially checking for WinJail sandbox window | ditekSHen | - 0x5233a:$v1: SbieDll.dll
- 0x4dcda:$v2: USER
- 0x4dd6e:$v2: USER
- 0x52354:$v2: USER
- 0x1274da:$v2: USER
- 0x127562:$v2: USER
- 0x127592:$v2: USER
- 0x128c02:$v2: USER
- 0x128c9a:$v2: USER
- 0x128cca:$v2: USER
- 0x52360:$v3: SANDBOX
- 0x52372:$v4: VIRUS
- 0x523c2:$v4: VIRUS
- 0x52380:$v5: MALWARE
- 0x52392:$v6: SCHMIDTI
- 0x523a6:$v7: CURRENTUSER
|
0.2.ADOC RFQ-WCMS-18097255.exe.2a3096c.0.raw.unpack | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen | - 0x3c538:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x4d5f8:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
- 0x3c56f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x4d684:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
- 0x3c5b2:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x4d728:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
- 0x3c5f9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x4d7d4:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
- 0x3c62c:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x4d864:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
- 0x3c663:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x4d8f0:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
- 0x3c6ac:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x4d9a0:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
- 0x3c6f2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
- 0x4da4c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
|
Click to see the 21 entries |