MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16f7ed92a89c49bd047aae5d809978a6d55f1344ca39dfe4a6444cab091d48ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 16f7ed92a89c49bd047aae5d809978a6d55f1344ca39dfe4a6444cab091d48ef
SHA3-384 hash: 21824082879744cb746f650aa02ff01c955b5c4749b45b221c77fddd3945c031196363a37e051ad3f56f824533b83df2
SHA1 hash: 8778e37fe4459dd66e944f7574ac1fd5722c2190
MD5 hash: 515f80901126cf39a1a88097c2d542cb
humanhash: hot-florida-beryllium-queen
File name:Veyhl new order - PO 351081.7z
Download: download sample
Signature AgentTesla
File size:646'132 bytes
First seen:2024-09-09 14:43:28 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:ym6sUS1lQWYvaKXbGiQie8a8VFIZN6WryIuNfQSZmoS8RXoXM:ymlxi3QixdFIZNA3ZPFRoXM
TLSH T1E1D4232B99F3542544C234D7E8259F28B42D1697F79BD0A9A40603977CE2F9AC8FCE31
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Magika sevenzip
Reporter cocaman
Tags:7z AgentTesla


Avatar
cocaman
Malicious email (T1566.001)
From: "Laura Winkelmann [Veyhl GmbH] <laura.winkelmann@veyhl.com>" (likely spoofed)
Received: "from veyhl.com (216-131-73-250.iad.as62651.net [216.131.73.250]) "
Date: "09 Sep 2024 07:42:14 -0700"
Subject: "new order - PO 351081"
Attachment: "Veyhl new order - PO 351081.7z"

Intelligence


File Origin
# of uploads :
1
# of downloads :
426
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Veyhl new order - PO 351081.exe
File size:879'616 bytes
SHA256 hash: 8ccca04fe86f770d8057a7209a6d31da8df7bace6f4a3d8e04d5bbfefc2661f3
MD5 hash: 61136861ddae7d53a0165c710bab05fe
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
Banker Encryption Execution Generic Network Static Heur Dexter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2024-09-09 10:55:42 UTC
File Type:
Binary (Archive)
Extracted files:
41
AV detection:
19 of 24 (79.17%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla credential_access discovery execution keylogger spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Credentials from Password Stores: Credentials from Web Browsers
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 16f7ed92a89c49bd047aae5d809978a6d55f1344ca39dfe4a6444cab091d48ef

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments