MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 10
| SHA256 hash: | 1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa |
|---|---|
| SHA3-384 hash: | e2b56d0ea51562012334a2e9db8b75165a90f30e4043b292425d2c7c8fd07fd1d591b6ce2316501a6ab200754a6bd75a |
| SHA1 hash: | 308d43fcccacbcba900bab7e693baa3405275b24 |
| MD5 hash: | a50f0eff3a5526342c9b086546deb2c5 |
| humanhash: | shade-sixteen-fourteen-mountain |
| File name: | a50f0eff3a5526342c9b086546deb2c5.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 742'400 bytes |
| First seen: | 2020-12-22 12:24:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 25df29f5f4fbc6abd76bc0c23b905dc7 (1 x AgentTesla) |
| ssdeep | 12288:A1BBzGfMfLJuMvgLuB7v3NjyUL25t6756MMy8ykMmXRd33MvaqYLdldp1Uk:A/BzGILJuMvgLs7PNFL25Py3yMcdldpe |
| Threatray | 80 similar samples on MalwareBazaar |
| TLSH | 74F48EB0F481257AC0A3343C2324F27391AFA4B19F28865F17C62D6A5D79D92C67AF53 |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
287
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a50f0eff3a5526342c9b086546deb2c5.exe
Verdict:
Suspicious activity
Analysis date:
2020-12-22 12:36:21 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
68 / 100
Signature
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Potential time zone aware malware
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Packed.Generic
Status:
Suspicious
First seen:
2020-12-22 12:25:05 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
1/5
Verdict:
malicious
Similar samples:
+ 70 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa
MD5 hash:
a50f0eff3a5526342c9b086546deb2c5
SHA1 hash:
308d43fcccacbcba900bab7e693baa3405275b24
SH256 hash:
435e9e52e4ff4ecde13faf5f406ca87fbc8b4982b198136249f007eb28019356
MD5 hash:
1db6e3830f1023781a1bb6d08f09857d
SHA1 hash:
eca3f317890bee3255d66f307dfd5d40f4e5a8c8
Detections:
win_redline_stealer_g0
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.