MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c3d8a2df50dffafea2a385695cb95e534bbb16c3ccb22675d8f1cc40dd4b4bba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | c3d8a2df50dffafea2a385695cb95e534bbb16c3ccb22675d8f1cc40dd4b4bba |
|---|---|
| SHA3-384 hash: | 6ff9b2971bc086e027a16251e0891d6adf3f8a1e92a3fc518b4b8b77ffa7ef616641369fe17d67613ddecb7c718b4a75 |
| SHA1 hash: | f6035d55e27b07dc7f01a74552b7a1f03e1b9fab |
| MD5 hash: | 7d6a5f6df352a802ff0a268d00457f8c |
| humanhash: | victor-angel-arizona-seven |
| File name: | Payment remitted.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 435'200 bytes |
| First seen: | 2020-05-11 19:54:10 UTC |
| Last seen: | 2020-05-11 20:47:25 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | be42d6107072948690efe619381545f8 (4 x NanoCore, 2 x AgentTesla) |
| ssdeep | 6144:fr+t9j+GP9NW4dble28ZLOS3+pVoEhZPJ5EW/R0xfZBS44x+SWbNdvK8Y:je+oNWyY2ELOtbR5EWufZBS44sLbbY |
| Threatray | 11'605 similar samples on MalwareBazaar |
| TLSH | 28942209DBF60A76D8095877AF135E086312F4E1AE0E2F234B10CD9EF4766975DA0A07 |
| Reporter | |
| Tags: | AgentTesla |
Intelligence
File Origin
# of uploads :
2
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-11 11:35:03 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
hawkeyekeylogger
Similar samples:
+ 11'595 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.