MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1c52fdf3b0e990fcb41ea7b549f42b96be5d5ad6222f47384c2d1569c9469e1d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 1c52fdf3b0e990fcb41ea7b549f42b96be5d5ad6222f47384c2d1569c9469e1d |
|---|---|
| SHA3-384 hash: | 75357edbfc09789debee7efc7e43ac246f16ec51c50979c5b34fe267c3c8b9fdddecc2f5260c5c9723211d44ac2d9024 |
| SHA1 hash: | 6abfb45d23bec9d2a061fc6c1d21e207c3bc782d |
| MD5 hash: | 44490623c48fb7efe1115fec9d34e0a1 |
| humanhash: | lake-red-butter-bakerloo |
| File name: | 3c31379f62ef2db5c910f656aa2368a2.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 298'496 bytes |
| First seen: | 2020-03-30 00:40:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:GG0WF+qym7NgYc0HkhFPqNsYVnMV1FN61b8MoyTV:V+W5xmitnMV14oyTV |
| Threatray | 10'475 similar samples on MalwareBazaar |
| TLSH | 7A543AAD2B88B902F73D593289D1267026F1D5834E12C74F7EC85EED7E527C92C0A396 |
| Reporter | |
| Tags: | AgentTesla exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://www.dieselmoreno.cl/form/xbtv2_encrypted_1B88620.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-03-30 01:35:20 UTC
File Type:
PE (.Net Exe)
AV detection:
23 of 30 (76.67%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'465 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
1235a1b2233c52011f348f1a5679fce4d3555ce48b9ca7cc98db059806f058b9
Dropped by
MD5 3c31379f62ef2db5c910f656aa2368a2
Dropped by
MD5 4c9341c3b5e85080b0760ecc9c05724d
Dropped by
GuLoader
Dropped by
SHA256 1235a1b2233c52011f348f1a5679fce4d3555ce48b9ca7cc98db059806f058b9
Dropped by
SHA256 10b9df4833a55bac025d858306d4d2d97561dcc5040ba32811913e633df6a9b4
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.