MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d6b47a7728293728613b03f3e615897081f6f2b09efafa9b798bb3b9dcd0f283. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | d6b47a7728293728613b03f3e615897081f6f2b09efafa9b798bb3b9dcd0f283 |
|---|---|
| SHA3-384 hash: | 9b25ac92fdedae19add1f66813e172c9f482f2e6225b6a44ecaf5b5a510a31c5542bcb96d489314252308341efb00962 |
| SHA1 hash: | fa025b1c1083ff3320aa2ab8dd5b93be7d6466f1 |
| MD5 hash: | c4c55ee713c4ebd51b4b9f8834cd1f1b |
| humanhash: | kilo-nuts-december-maryland |
| File name: | c6d0a8b1e2a3ac05e49691fa76795149.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 298'496 bytes |
| First seen: | 2020-03-31 19:25:11 UTC |
| Last seen: | 2020-04-09 18:10:39 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:Eyr6v0BcTOUYwWbbb1lpLcjKBMJdYTaKbroyTV:jr6c6Os+5lzhoyTV |
| Threatray | 10'679 similar samples on MalwareBazaar |
| TLSH | 1A54296D2B88B902FB3D593389D126A052F1D4834D22DB0F6EC41FFD7E567C9284A395 |
| Reporter | |
| Tags: | AgentTesla exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=1lqfVeJT5vod-2MD2eNA1CjclhHKQWD2P
Intelligence
File Origin
# of uploads :
2
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-03-31 19:35:32 UTC
File Type:
PE (.Net Exe)
AV detection:
25 of 31 (80.65%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'669 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
c36e205a6e8483422357a2829ed215097a81b02ad343a201a5419d9fe82ae0ac
Dropped by
MD5 c6d0a8b1e2a3ac05e49691fa76795149
Dropped by
MD5 c10b53d0cc625053a4c6e7024789af3f
Dropped by
GuLoader
Dropped by
SHA256 c36e205a6e8483422357a2829ed215097a81b02ad343a201a5419d9fe82ae0ac
Dropped by
SHA256 d859715adda7f85e5a931f6cfdf28e0d132424226ac1bd859e6cad60b0175b7d
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.