MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1480e69cac4dec8dba239678446472b12f18cc5e963cc8b7c507a9ccaeaa75cf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 1480e69cac4dec8dba239678446472b12f18cc5e963cc8b7c507a9ccaeaa75cf
SHA3-384 hash: 6cb48410d6bf48d5b899e00c57c6d2db5474c28ef868379e2529349b32d957e9e686dce45184b3af89fe1a05013038c8
SHA1 hash: 32b6d7e6ccaf776dc46fed1919946d355172ff4c
MD5 hash: be45bf7f251ecc68fc1210b927aa7453
humanhash: jupiter-mountain-kentucky-bluebird
File name:COVID-19_040220.exe
Download: download sample
Signature AgentTesla
File size:102'400 bytes
First seen:2020-04-02 15:33:32 UTC
Last seen:2020-04-02 16:50:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 72712f58e373ae35fd1ba25cd72b40e3 (1 x AgentTesla)
ssdeep 768:4FiB8tfWoVmG84fIOz+q4nS7DQZxmuUpLf6m6gGwDBIstrjM8LEk46yMb:h8YoMGVpDZbuVepfVY8LW6f
Threatray 629 similar samples on MalwareBazaar
TLSH 37A3C625BD50FE10D4188A708E7ADBFC4229BD30AE456B4BB6C03F7E3D31191BA91B56
Reporter abuse_ch
Tags:AgentTesla COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader->AgentTesla:

HELO: ns392991.ip-176-31-110.eu
Sending IP: 176.31.110.7
From: Dr. Kim Jung <info@hardworkingincs.pro>
Subject: Latest vaccine release for Corona-virus(COVID-19)
Attachment: COVID-19_040220.rar (contains "COVID-19_040220.exe")

GuLoader payload URL (AgentTesla):
https://drive.google.com/uc?export=download&id=1CLCbjFy3aoGBl07CLV-M4GdEGw7Io-ns

AgentTesla SMTP exfil server:
mail.asesoriaurquijo.net:587 (31.193.225.102)

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Minix
Status:
Malicious
First seen:
2020-04-02 15:35:20 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaFileOpen

Comments