MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41eb1b14f228c881ea01adc491d19378591d1ea4dffc4e8c7a74953de73faf43. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 41eb1b14f228c881ea01adc491d19378591d1ea4dffc4e8c7a74953de73faf43
SHA3-384 hash: aaa172773585b60d783a32f5dac043d2766fdf58aa61bbe4e0c3d4468bc284ee2b933772a08c2b923451b08506a7ef9a
SHA1 hash: 96c8f56858e51808393a8398997def3a681069d3
MD5 hash: 1c57eb8598e7173642150517abe9e4f5
humanhash: early-cold-carbon-montana
File name:Payment Advice - Advice Ref[GLV701475374] Priority payment Customer Ref[100000844741].exe
Download: download sample
Signature AgentTesla
File size:893'440 bytes
First seen:2020-07-08 06:43:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:nmO1R9FDUSngcvUDAfEYuIonZTfkGuKREWlhKlXwsHZ/WNNxShKlXwsHZ/WNNx1I:mO1Pd7vUDMFoNfLrhslhtWEslhtWTI
Threatray 937 similar samples on MalwareBazaar
TLSH BA15D031BBA1AA01C73E0F35E97242006E7698AF6E06F68F1DC825ED4E5B7856D43707
Reporter abuse_ch
Tags:AgentTesla exe HSBC


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: srv.newton.co.id
Sending IP: 103.253.115.37
From: HSBC Advising Service <advising.service.10525134.856388.2937908728@mail.hsbcnet.hsbc.com>
Subject: Payment Advice - Advice Ref:[GLV701475374] / Priority payment / Customer Ref:[100000844741]
Attachment: Payment Advice - Advice RefGLV701475374 Priority payment Customer Ref100000844741.r00 (contains "Payment Advice - Advice Ref[GLV701475374] Priority payment Customer Ref[100000844741].exe")

AgentTesla SMTP exfil server:
smtp.altrii.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Threat name:
ByteCode-MSIL.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-08 06:45:06 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
keylogger trojan stealer spyware family:agenttesla
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Maps connected drives based on registry
Reads data files stored by FTP clients
Checks BIOS information in registry
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

1b3839d268a1443eac613a1d47e97985

AgentTesla

Executable exe 41eb1b14f228c881ea01adc491d19378591d1ea4dffc4e8c7a74953de73faf43

(this sample)

  
Dropped by
MD5 1b3839d268a1443eac613a1d47e97985
  
Delivery method
Distributed via e-mail attachment

Comments