MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36418297fd0a5c6118bd0838825b7d54a9e144fea29428a48eea7c4ed5cb7499. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 36418297fd0a5c6118bd0838825b7d54a9e144fea29428a48eea7c4ed5cb7499
SHA3-384 hash: ccc1174ee64ea682589a568e103cd4c7e9e70e982e7738be0927289726da2da07e01b88332587d905f931ba83d82c36b
SHA1 hash: eb698b2a8c911122cfc4cd152fa5c079df40d36d
MD5 hash: e4b3a7f5c5173c5ca72f3a5d5bc2d4d6
humanhash: oscar-ink-fix-orange
File name:Late Review Order Project.exe
Download: download sample
Signature AgentTesla
File size:912'384 bytes
First seen:2020-07-08 08:21:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 24576:vTdy1e7CmzKTuqPVc+O1yNyy1CslhtWoslhtWgT:oym68clty1/htWlhtW
Threatray 893 similar samples on MalwareBazaar
TLSH 8015D131BBA19A01C73E4F35E96282006E76946B7E06E68F6ECC24ED4E5F7442D47B07
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: oucomarine-group.com
Sending IP: 209.58.149.70
From: Simag C. Hessah<sales1@oucomarine-group.com>
Subject: AW:Late Review Order Project
Attachment: Late Review Order Project.310074.GIT.pdf.gz (contains "Late Review Order Project.exe")

AgentTesla SMTP exfil server:
smtp.yandex.ru:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a service
Creating a file
Stealing user critical data
Threat name:
ByteCode-MSIL.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-08 08:23:05 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
spyware keylogger trojan stealer family:agenttesla
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Reads user/profile data of local email clients
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

ef66cde6b62ac3498055d5644acc295b

AgentTesla

Executable exe 36418297fd0a5c6118bd0838825b7d54a9e144fea29428a48eea7c4ed5cb7499

(this sample)

  
Dropped by
MD5 ef66cde6b62ac3498055d5644acc295b
  
Delivery method
Distributed via e-mail attachment

Comments