MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a6bc243e8956f73a480418dba78d343eab3abd486248044c9f9e7d2dd9fd0795. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | a6bc243e8956f73a480418dba78d343eab3abd486248044c9f9e7d2dd9fd0795 |
|---|---|
| SHA3-384 hash: | e925e8a7a5882fb539a4090edfb6c9b8cd688f800834220db024c7d9931f33064642f38202a979c7acc68520902f44ea |
| SHA1 hash: | 2fc702a3254c75631a49e831b76b7b5a3f4db63b |
| MD5 hash: | b484e2110ea359a01a5bf49bf07645a1 |
| humanhash: | batman-pip-apart-uniform |
| File name: | FcDqk2Gom1iPyLp.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 503'296 bytes |
| First seen: | 2020-04-30 09:27:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:zxBv/dTFqyIhFLVUebA/qqe7ygHi345BqT:LiyYVIiBrid |
| Threatray | 112 similar samples on MalwareBazaar |
| TLSH | 9FB4F11222958C97CB6A29F84892F3180775EF597453E7DE6EC031FF0AF6BD26506283 |
| Reporter | |
| Tags: | AgentTesla exe |
abuse_ch
Malspam distributing AgentTesla:HELO: uzlinshpl01.uzcloud.uz
Sending IP: 185.74.4.8
From: Brad pence <sale@e.siriusxm.com>
Reply-To: oliviamiller878@gmail.com
Subject: Document 04/30/2020
Attachment: Doc 30.04.2020.rar (contains "FcDqk2Gom1iPyLp.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-29 23:19:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
24 of 31 (77.42%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
unknown
Similar samples:
+ 102 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.