MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 14eb0d2e21f743b14c8ccfb48a07d592246744d1a2fbd79d6b32170fbeb74a4d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 14eb0d2e21f743b14c8ccfb48a07d592246744d1a2fbd79d6b32170fbeb74a4d
SHA3-384 hash: f2164896b8831fa5c87e20c9d6545be2290510d97f04dcfc0954e3bdefc65996ac74f1b644ab1e6ed91e27ca52410e1a
SHA1 hash: ec7f93a4e4f17c8c66f39cce1c9f4488db469946
MD5 hash: d0e61c0e5a3ce3762e9eea8a9320e5de
humanhash: wisconsin-kilo-sierra-freddie
File name:BANK DETAILS.zip
Download: download sample
Signature AgentTesla
File size:747'164 bytes
First seen:2021-06-09 05:18:47 UTC
Last seen:2021-06-09 05:21:02 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:z+GLJHNZ3UBB/1EH0NStkyYARM1Iin/m+hVa3Panp73QXc0nCDVmHcEUUl:dlHTUTE0SthUSiO+h43P+Q/C5zKl
TLSH D8F4331B3E8450890FBF4F069A6FDCE4957E8A95177DB3083D457C4BCB2234A91B2E4A
Reporter cocaman
Tags:AgentTesla zip


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?B?RGF2aWQgTmfCoA==?=<customercare@omfreight.com.cn>" (likely spoofed)
Received: "from omfreight.com.cn (unknown [185.222.58.149]) "
Date: "08 Jun 2021 09:22:42 -0700"
Subject: "=?UTF-8?B?UkU6UkVDT05GSVJNIEJBTksgREVUQUlMUyBGT1LCoFBBWU1FTlQ=?="
Attachment: "BANK DETAILS.zip"

Intelligence


File Origin
# of uploads :
3
# of downloads :
190
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-08 13:39:54 UTC
File Type:
Binary (Archive)
Extracted files:
67
AV detection:
9 of 46 (19.57%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla evasion keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Looks for VMWare Tools registry key
AgentTesla Payload
Looks for VirtualBox Guest Additions in registry
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 14eb0d2e21f743b14c8ccfb48a07d592246744d1a2fbd79d6b32170fbeb74a4d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments