MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b788eb3fa4068c4846abac921c00bb9142ce5f19944553055603d1a174aed5a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments 1

SHA256 hash: b788eb3fa4068c4846abac921c00bb9142ce5f19944553055603d1a174aed5a0
SHA3-384 hash: 372f0c9f9c59a4cdc924ff44ec558f15a4303dd1a42b94e6cbb52724157ae045f4705a1492b3e1ba358446068a066ac0
SHA1 hash: 2c1780413a23d9fbeb6181bf35952096afdc317c
MD5 hash: 8f3374cfbb9e8a4e755d5d81aa854956
humanhash: mississippi-uncle-fourteen-mike
File name:30007fe97db1f5b971f219a10d5d9c44.exe
Download: download sample
Signature AgentTesla
File size:299'008 bytes
First seen:2020-03-31 21:45:10 UTC
Last seen:2020-04-01 10:28:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:WsMtIt40CE636Ie2OdtY+qU9w5hnlkZn1YTHbbboyTf:rMtK40Wre2Odi+CqeLoyTf
Threatray 10'586 similar samples on MalwareBazaar
TLSH E5543A6D2B48BA02F73D5A3249E1266016F1D4838D12C74F7EC51EEDBF527CA6C0A396
Reporter abuse_ch
Tags:AgentTesla exe GuLoader


Avatar
abuse_ch
Payload dropped by GuLoader from the following URL:
https://onedrive.live.com/download?cid=AE80108520D75992&resid=AE80108520D75992%21108&authkey=AAVaAf29YqFJ4Z0

Intelligence


File Origin
# of uploads :
3
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-03-31 22:35:24 UTC
File Type:
PE (.Net Exe)
AV detection:
30 of 47 (63.83%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
MD5 6ef74208706d0c555b11217ad6406eaa
  
Dropped by
GuLoader
  
Dropped by
SHA256 85fe0bb674204822159672b28c96122e5007763a2bd18db758500081ed7a2ca0

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments



Avatar
commented on 2020-04-01 10:28:31 UTC

COVID-19 themed malspam distributing GuLoader->AgentTesla:

HELO: goldmedicalsupplies.com
Sending IP: 209.58.149.66
From: Sheila Conley <info@goldmedicalsupplies.com>
Subject: URGENT NEED: U.S. Department of Health & Human Services/COVID-19 Face Mask/ Forehead thermometers
Attachment: product list.pdf.gz (contains "product list.pdf.exe")

GuLoader payload URL (AgentTesla):
https://onedrive.live.com/download?cid=AE80108520D75992&resid=AE80108520D75992%21108&authkey=AAVaAf29YqFJ4Z0

AgentTesla SMTP exfil server:
smtp.1and1.es:587 (212.227.15.158)