MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 15
| SHA256 hash: | 0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063 |
|---|---|
| SHA3-384 hash: | 09252030c51bff5ea205fc5480d70da1a5fd4316412a8672e3f2e086c3396c13134fcc29fb9807d42dacd6534db0d1cf |
| SHA1 hash: | eb5e5e14b83ff5259f5908de1179cba4f41fe3df |
| MD5 hash: | caecd32bcc0b7e065924dbf4c37a01e4 |
| humanhash: | pizza-muppet-friend-bakerloo |
| File name: | New order.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 719'360 bytes |
| First seen: | 2023-05-19 12:33:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:zMqBG/uEspgx3NJx+FrfMzRWMZMYvXFt7F2yaKnS42klrcg:4qUEmdx+J4MuVtsqnxz |
| Threatray | 3'928 similar samples on MalwareBazaar |
| TLSH | T1DFE4D01423A58B4AE5BA47F54DE0D1F01BB6AD9EB435C21B0ED5FCCB327AB920711A13 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 3119113da9a9a929 (8 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
DKVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063
b3fbab4d8090fb6109b890d24c1e457db6e3f6bd5e17c6be2f2cb8448d53d5ab
92a4f2858bb9f3e546b315c52ee4e07903125b02f55c23cc8ae3e32e2012b2e0
577593e5d16e4c0439339d4345505db0eb1595670ebdb271feaeaab510fd8b56
d9306a1c01d5697b35534bd8156c06c6a18bc9b9f582a53de124534f35d0fa74
f45d13987da07c44c15886a61b0534254e8dfc55b9dca16156df5e2a21bfc5fd
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MSIL_SUSP_OBFUSC_XorStringsNet |
|---|---|
| Author: | dr4k0nia |
| Description: | Detects XorStringsNET string encryption, and other obfuscators derived from it |
| Reference: | https://github.com/dr4k0nia/yara-rules |
| Rule name: | msil_susp_obf_xorstringsnet |
|---|---|
| Author: | dr4k0nia |
| Description: | Detects XorStringsNET string encryption, and other obfuscators derived from it |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.