MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f961b3aec87937a824418177759ef0fcff251770db2104664ce964c51af85621. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | f961b3aec87937a824418177759ef0fcff251770db2104664ce964c51af85621 |
|---|---|
| SHA3-384 hash: | 1e2b8852595309b090e620adeb7d5dd8a7b46a5b7a5f9cd4a1f1c6671660505914400fe111b774421393bb89d252f032 |
| SHA1 hash: | d5dc4a15186b588e2aa76ed35bd789c43c951fa0 |
| MD5 hash: | f8c66d4bdd8432bd9d33cad7bbee831d |
| humanhash: | papa-lactose-charlie-monkey |
| File name: | Payment SlipFor Balance Vesse.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 425'984 bytes |
| First seen: | 2020-05-19 14:14:25 UTC |
| Last seen: | 2020-05-19 18:39:34 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c458ff2d515beb8f44158cd3636a7400 (19 x AgentTesla, 6 x NetWire, 3 x HawkEye) |
| ssdeep | 12288:4Lr03pJOxumjKeYXKoue6JHc6ZWIqTU0LTlI5sb:mgZcMYetuzJ8WqLxI5sb |
| Threatray | 11'254 similar samples on MalwareBazaar |
| TLSH | CC9412CFEBC042BBC51AA43302472D90B66EF042261D7F935636E84EF1719A7EBB1255 |
| Reporter | |
| Tags: | AgentTesla |
Intelligence
File Origin
# of uploads :
3
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-19 15:20:00 UTC
File Type:
PE (Exe)
Extracted files:
513
AV detection:
22 of 31 (70.97%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
hawkeyekeylogger
Similar samples:
+ 11'244 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.