MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 28612f73668350130867b21bdbf9acfc75c12106ef59f459c77f4522a513211b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 28612f73668350130867b21bdbf9acfc75c12106ef59f459c77f4522a513211b |
|---|---|
| SHA3-384 hash: | ec314693ede49d7ccc8c26185b195dd443381dd65ffdfced6de9796eec7d731344e39762869501a7dff71609c3c9f5d5 |
| SHA1 hash: | b93bccb34d2c7f800424ed7cffaea6fb22e9097e |
| MD5 hash: | 0cdb4724f5ac28b35ab4e1470d3781da |
| humanhash: | princess-purple-mexico-georgia |
| File name: | a6344651ef60f69bea9fa88cb18fb363.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 299'008 bytes |
| First seen: | 2020-03-29 21:10:33 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:MO7SVc4dDJakTxHJ7ZwhYPFBenqRJg0QFKOYT6ibgoaTV:fSjdlNKhU2nqzyK7WoaTV |
| Threatray | 10'547 similar samples on MalwareBazaar |
| TLSH | 7D543A6D2F88B902F73D5D3289D1667052F194834D22CB0F3EC85FEC7A5A7CA294A395 |
| Reporter | |
| Tags: | AgentTesla exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://onedrive.live.com/download?cid=7A5E689DD1DC641F&resid=7A5E689DD1DC641F%21106&authkey=ALAoak1EMTtbw6w
Intelligence
File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-03-29 21:35:24 UTC
File Type:
PE (.Net Exe)
AV detection:
26 of 31 (83.87%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'537 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
07214102dd5b2c342a4e4fdef4301ad51429f91dfa2e877ec93194f8e73d5ec7
Dropped by
MD5 a6344651ef60f69bea9fa88cb18fb363
Dropped by
MD5 4e33d2ee3e202b3130dc153d8c1ab2e4
Dropped by
GuLoader
Dropped by
SHA256 07214102dd5b2c342a4e4fdef4301ad51429f91dfa2e877ec93194f8e73d5ec7
Dropped by
SHA256 79ba22d10d43fe6cbbba1b4458b5ed177ed8e8b085d21ed3b79ad34f77236de4
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.