MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 041320839c8485e8dcbdf8ad7f2363f71a9609ce10a7212c52b6ada033c82bc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 041320839c8485e8dcbdf8ad7f2363f71a9609ce10a7212c52b6ada033c82bc5
SHA3-384 hash: 55d4c333cf65198ebb3f77bc6b0402e14d82e2928c640b88743547a0c1d656b80c0166cbc721a88b2ec3d6ac37ad98d8
SHA1 hash: 23a0b4655bc51fff966ba87d350c769c833d873b
MD5 hash: 791a1240d70a20f2b1383dc1bf8d6f90
humanhash: september-yankee-washington-yankee
File name:vaccine release for Corona-virus(COVID-19)_pdf.exe
Download: download sample
Signature AgentTesla
File size:102'400 bytes
First seen:2020-04-03 11:20:11 UTC
Last seen:2020-04-03 21:07:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4c8457ec39ff3f11c8e9a32890de9c8d (1 x AgentTesla)
ssdeep 768:2Lw2t5RT1oL4MFRrNhI0BgJreVJBuj0/p4P+O2k5BjBYzM5qeMrzA:B4toL4MFRrNiBJQoK4pDjBYziqen
Threatray 276 similar samples on MalwareBazaar
TLSH 1BA3E612BD51FD50C4104EB19DBAD3EC8129FC749D496A87BAC53FAE3C300A2B651B8B
Reporter abuse_ch
Tags:AgentTesla COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader->AgentTesla:

HELO: mail2-ppa.jpcinet.co.uk
Sending IP: 212.113.198.219
From: Dr. Kim Jung <info@hardworkingincs.pro>
Subject: Latest vaccine release for Corona-virus(COVID-19) (contains "vaccine release for Corona-virus(COVID-19)_pdf.exe")

AgentTesla SMTP exfil server:
us2.smtp.mailhostbox.com:587 (208.91.198.143)

Intelligence


File Origin
# of uploads :
3
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-04-03 10:09:28 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef

Comments