MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06d6ece1fa6b728d5b5f538d740a60626e99cbbe6df5bd5a5c3f2a8923b0fd98. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: 06d6ece1fa6b728d5b5f538d740a60626e99cbbe6df5bd5a5c3f2a8923b0fd98
SHA3-384 hash: cc543ba5cf785fbe9d509983e3e2ca0a477dd2fee1dd2475cefe2105b74a82c3581a01c63f03e48665b95edd45bdf527
SHA1 hash: 0eef31ecab9b0d46c811088e76952ad5085223b7
MD5 hash: 8dbb4e5dbf052e1d64f808f42ef7ea1f
humanhash: princess-oranges-yellow-early
File name:REQUEST FOR QUOTATION RFQ #10201817_PDF.exe
Download: download sample
Signature AgentTesla
File size:1'525'760 bytes
First seen:2020-06-17 07:54:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7
ssdeep 24576:XAHnh+eWsN3skA4RV1Hom2KXMmHaMA80lzSlW5vzbh3ki7U0CDWRd5:Kh+ZkldoPK8YaMA8Q3d3zo0CSt
TLSH 9365CF9273C1C031FEA791778B3AF253567A791D4837851F22943E6ABC713A2123E663
Reporter @abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
AgentTeslaV2
Gathering data
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2020-06-16 13:23:59 UTC
AV detection:
27 of 31 (87.10%)
Threat level
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
spyware persistence keylogger trojan stealer family:agenttesla
Behaviour
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Modifies service
Reads user/profile data of web browsers
Reads user/profile data of local email clients
Reads data files stored by FTP clients
Drops startup file
AgentTesla

Yara Signatures


Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:win_agent_tesla_w1
Author:govcert_ch
Description:Detect Agent Tesla based on common .NET code sequences

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 06d6ece1fa6b728d5b5f538d740a60626e99cbbe6df5bd5a5c3f2a8923b0fd98

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments