MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a6f58799573f8dc4cab3ceb48832902460b893bc5607cb77ade332b7d4f3a91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 0a6f58799573f8dc4cab3ceb48832902460b893bc5607cb77ade332b7d4f3a91
SHA3-384 hash: 5f5b1f30c8e30bf12db740a5ffa2077419de1082695b9ee4fef40aa15ac56d4172a9ad9331fe5e2323323338e26d2fa4
SHA1 hash: 9d1962370ee2d24bd39893f5e34f8447d60f0ccf
MD5 hash: fb94a873a87e7feb02b3178566e364d7
humanhash: massachusetts-spaghetti-monkey-charlie
File name:WARNING OF CORONA VIRUS COVID-19 BEWARE! COVID 19 IS WITHIN!!!.exe
Download: download sample
Signature AgentTesla
File size:1'020'416 bytes
First seen:2020-04-07 06:59:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c5e26694677f289b4128062081b2365e (1 x AgentTesla)
ssdeep 24576:eJs5zbW+MmtE6ZiaiOFL1V/mnPSfhrIKRmp5gwy:eJs5zw2ZioL/a4rIKwHTy
Threatray 11'885 similar samples on MalwareBazaar
TLSH CB25AC2FD9696422EE9A1532C4A04FD9953BAC143321DBCBB896BF1931CC781717F70A
Reporter abuse_ch
Tags:AgentTesla COVID-19 exe


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: 162-241-214-72.unifiedlayer.com
Sending IP: 162.241.214.72
From: HR Department <HR@victim-domain>
Subject: CORONA VIRUS COVID-19 PANDEMIC IS WITHIN, BEWARE! WARNING!!! WARNING!!! WARNING!!!
Attachment: WARNING OF CORONA VIRUS COVID-19 BEWARE COVID 19 IS WITHIN.IMG (contains "WARNING OF CORONA VIRUS COVID-19 BEWARE! COVID 19 IS WITHIN!!!.exe")

AgentTesla SMTP exfil server:
smtp.recornit.com:587 (208.91.199.223)

AgentTesla SMTP exfil email address:
sales@recornit.com

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-07 07:36:13 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 0a6f58799573f8dc4cab3ceb48832902460b893bc5607cb77ade332b7d4f3a91

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
RPC_APICan Execute Remote ProceduresRPCRT4.dll::RpcEpResolveBinding
RPCRT4.dll::RpcEpUnregister
RPCRT4.dll::RpcErrorAddRecord
RPCRT4.dll::RpcErrorEndEnumeration
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::ImpersonateLoggedOnUser
SS_APIUses SS APISecur32.dll::QuerySecurityPackageInfoA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::EmptyClipboard
USER32.dll::OpenClipboard
USER32.dll::CreateWindowExA

Comments