MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 071e686cfd7588fdc60e84ef03716534b7a2de1f3afe5d6bbda95fcd223ab334. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 071e686cfd7588fdc60e84ef03716534b7a2de1f3afe5d6bbda95fcd223ab334
SHA3-384 hash: a77cec9853398b5e03d7aee6649270556a27a8841506275edc217737b995d348fb1971e91758ce55963622c916dd4663
SHA1 hash: 6fa4eb9a31e35ae9ac6ea410259bc479ebb9a26d
MD5 hash: 3f78c8f4d93353c515c1fcb15c73c9e5
humanhash: timing-magnesium-chicken-bluebird
File name:DOC RFQ 8736229_pdf.exe
Download: download sample
Signature AgentTesla
File size:238'080 bytes
First seen:2020-07-03 06:34:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 3072:D1+tHaKb6CnosMJ0XEyMxez/E5Zim6LkZxnzn8p7zcUraMGA+m+cUaiBVq23Yltn:DddjVeIZim6wZ18Ow7GD5cliBVq2WkO
Threatray 1'245 similar samples on MalwareBazaar
TLSH 5034D0355780FDA6C43F4EF8F24021101F746423AA52E79CAED171E732EB7218A66B97
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: li1640-29.members.linode.com
Sending IP: 172.104.60.29
From: Noman Khan <norman.khan@siscosaudi.com>
Reply-To: norman.khan@siscosaudi.com
Subject: RFQ-0715-ARAMCO ABQAIQ PROJECT REQUIREMENT - SISCO
Attachment: DOC RFQ 8736229_pdf.zip (contains "DOC RFQ 8736229_pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Backdoor.Rescoms
Status:
Malicious
First seen:
2020-07-03 06:36:07 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
spyware keylogger trojan stealer family:agenttesla rat family:remcos
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla
Remcos
Malware Config
C2 Extraction:
109.169.89.116:2021
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 071e686cfd7588fdc60e84ef03716534b7a2de1f3afe5d6bbda95fcd223ab334

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments