MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 024da5bcb62d3a21ab2e55db0c3a600f29778c43eb00a7246a61037c6e55c018. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 024da5bcb62d3a21ab2e55db0c3a600f29778c43eb00a7246a61037c6e55c018
SHA3-384 hash: f0c480ccc00da86ceb6d2e37a3ad5eeb76ca4b338f5f4a910a018e298e50c5ba0a5e63e9d7a49fa440eb9dc5dff4d2c4
SHA1 hash: 38aff2b047cb43d0158f7d35d10e76aadfa9ac14
MD5 hash: 01bde51fb30a013b7536dc7d45ea4a0a
humanhash: summer-gee-wolfram-nebraska
File name:#10001210.zip
Download: download sample
Signature AgentTesla
File size:750'588 bytes
First seen:2021-04-14 18:11:18 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:mRxGAUoCnlIYZWpyXnBw/SgZNFXU2Br93W9qjarlegc0hdzv5it:mR0LozaXCagZbXU3q+rlFc8zvot
TLSH 27F43346B9E11ABC82EAF55F128C93D4E50E89E8C5395B116D22602E77DC2A9F37F103
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Infostealer.Stelega
Status:
Malicious
First seen:
2021-04-14 05:49:20 UTC
AV detection:
21 of 47 (44.68%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 024da5bcb62d3a21ab2e55db0c3a600f29778c43eb00a7246a61037c6e55c018

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments