MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19bd0b352a50b82c411dd325b170d7689c1485850f1543001158ec8394d05e5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 19bd0b352a50b82c411dd325b170d7689c1485850f1543001158ec8394d05e5e
SHA3-384 hash: 11de5a7e558b9449593793b0ecc53ac2e25196f1dc7fcbe86baac3b245cd0ea273456bf3e41ed2783c64e0d2253ea969
SHA1 hash: dddf6928d32a7a3cf4cb5b664f73028cd84fa460
MD5 hash: d5f1fbbc0dffccf347d4fb7f801cf445
humanhash: lactose-steak-speaker-illinois
File name:New Purchase order.R20
Download: download sample
Signature AgentTesla
File size:767'471 bytes
First seen:2021-04-12 06:38:40 UTC
Last seen:2021-04-12 13:55:33 UTC
File type: rar
MIME type:application/x-rar
ssdeep 12288:/7wzBF7NGoyrHrkW7GPSeFDyTGHWI12RnG7fmBpWoSVI7LzAfjIEUNEIc2YjZyD0:cXpHerwPS8gI3124zmBpW7I7HAEHc2Y7
TLSH 7FF4239F357600FCDE30192B8F54CB985F671333B722989887085E66B163366AEDD06D
Reporter lowmal3

Intelligence


File Origin
# of uploads :
3
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-12 06:39:06 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Drops desktop.ini file(s)
Uses the VBS compiler for execution
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 19bd0b352a50b82c411dd325b170d7689c1485850f1543001158ec8394d05e5e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments