MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1c4ac768f9aa607d3a57dad6eb1313409f190fb0275ee624daf235e949f4cc40. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 1c4ac768f9aa607d3a57dad6eb1313409f190fb0275ee624daf235e949f4cc40
SHA3-384 hash: 8399a32209beeb685c0ab73b287e3900c54acda11651ecd98d3f0c16b0be9d9aac221184806b2edf0b715fb3872ebb42
SHA1 hash: 1ec19b2d721f3170f065ff4aa523f1d4d612293e
MD5 hash: 8bdc1d3a605be849d0b9193261b019f7
humanhash: quiet-skylark-mango-sierra
File name:SecuriteInfo.com.Variant.Fragtor.325313.3682.1255
Download: download sample
File size:55'296 bytes
First seen:2023-07-21 03:29:18 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 34883f7c726f8d22a3df207a2d7bbb03
ssdeep 768:mSACumj/nWx4Qw9vL6DH7ODg8FiFWDzQ+X1WWcavvUAyRPhjUimnTEDw7vyF:mSACumznWa1t6GRFiQDzNFWWRAvjMa
Threatray 2'288 similar samples on MalwareBazaar
TLSH T1FC435C13629294B3F2F251793060A1726C7E7D716AF0408B7F8A15786E707D2A7B8B47
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:dll

Intelligence


File Origin
# of uploads :
1
# of downloads :
332
Origin country :
FR FR
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1277164 Sample: SecuriteInfo.com.Variant.Fr... Startdate: 21/07/2023 Architecture: WINDOWS Score: 48 42 Multi AV Scanner detection for submitted file 2->42 8 loaddll32.exe 1 2->8         started        10 jrnwgcl.exe 2->10         started        12 jrnwgcl.exe 2->12         started        process3 process4 14 rundll32.exe 8->14         started        16 cmd.exe 1 8->16         started        18 rundll32.exe 1 2 8->18         started        21 8 other processes 8->21 file5 23 WerFault.exe 14->23         started        26 rundll32.exe 16->26         started        38 C:\Users\user\AppData\Roaming\...\jrnwgcl.exe, PE32 18->38 dropped 28 WerFault.exe 9 21->28         started        30 WerFault.exe 2 9 21->30         started        32 WerFault.exe 4 9 21->32         started        34 2 other processes 21->34 process6 dnsIp7 40 192.168.2.1 unknown unknown 23->40 36 WerFault.exe 20 9 26->36         started        process8
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-07-21 03:30:05 UTC
File Type:
PE (Dll)
AV detection:
19 of 25 (76.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
1c4ac768f9aa607d3a57dad6eb1313409f190fb0275ee624daf235e949f4cc40
MD5 hash:
8bdc1d3a605be849d0b9193261b019f7
SHA1 hash:
1ec19b2d721f3170f065ff4aa523f1d4d612293e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments