MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa
SHA3-384 hash: e2b56d0ea51562012334a2e9db8b75165a90f30e4043b292425d2c7c8fd07fd1d591b6ce2316501a6ab200754a6bd75a
SHA1 hash: 308d43fcccacbcba900bab7e693baa3405275b24
MD5 hash: a50f0eff3a5526342c9b086546deb2c5
humanhash: shade-sixteen-fourteen-mountain
File name:a50f0eff3a5526342c9b086546deb2c5.exe
Download: download sample
Signature AgentTesla
File size:742'400 bytes
First seen:2020-12-22 12:24:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 25df29f5f4fbc6abd76bc0c23b905dc7 (1 x AgentTesla)
ssdeep 12288:A1BBzGfMfLJuMvgLuB7v3NjyUL25t6756MMy8ykMmXRd33MvaqYLdldp1Uk:A/BzGILJuMvgLs7PNFL25Py3yMcdldpe
Threatray 80 similar samples on MalwareBazaar
TLSH 74F48EB0F481257AC0A3343C2324F27391AFA4B19F28865F17C62D6A5D79D92C67AF53
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
287
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a50f0eff3a5526342c9b086546deb2c5.exe
Verdict:
Suspicious activity
Analysis date:
2020-12-22 12:36:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
68 / 100
Signature
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Potential time zone aware malware
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Packed.Generic
Status:
Suspicious
First seen:
2020-12-22 12:25:05 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  1/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa
MD5 hash:
a50f0eff3a5526342c9b086546deb2c5
SHA1 hash:
308d43fcccacbcba900bab7e693baa3405275b24
SH256 hash:
435e9e52e4ff4ecde13faf5f406ca87fbc8b4982b198136249f007eb28019356
MD5 hash:
1db6e3830f1023781a1bb6d08f09857d
SHA1 hash:
eca3f317890bee3255d66f307dfd5d40f4e5a8c8
Detections:
win_redline_stealer_g0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 1d33d9f8bccc11aacad8a24e7342d8dea181854df3258cff47020b23a0a754aa

(this sample)

  
Delivery method
Distributed via web download

Comments