MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1e7cf8b50b0888244fa3734343408fee6f0b53b1c8e87e9788e5c1d914c4e56c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 1e7cf8b50b0888244fa3734343408fee6f0b53b1c8e87e9788e5c1d914c4e56c |
|---|---|
| SHA3-384 hash: | 07711c87f56ab908c0e54c411ad72a629b1762c0eb1d2cedbced48223de8e886451b6685f91ebc8831e0d4c6707b8fb7 |
| SHA1 hash: | 684385bc11537b2660869794ec8b50270dbd89d1 |
| MD5 hash: | 518e696756b87c0260e0a6dbdd9602c3 |
| humanhash: | magnesium-sad-freddie-connecticut |
| File name: | Ziraat Bankasi Swift Mesaji.r19 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 780'653 bytes |
| First seen: | 2022-07-20 07:09:37 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:s3hxpd/UzbefC4vhW6uX/qIWdod1KracvJcnqBQZc3FMbgENAJOj/xYg98hu:sRx0zbefjvU6arGrhcnqB3e0JO5Ykku |
| TLSH | T1FEF423D1A368BD2D01502F3703B3E1DD816CCB96FC69A4E8591077987FB1DD80B86AA7 |
| TrID | 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1) 38.4% (.RAR) RAR compressed archive (gen) (5000/1) |
| Reporter | |
| Tags: | AgentTesla r19 rar SWIFT |
cocaman
Malicious email (T1566.001)From: "ZIRAAT BANKASI <ziraatbank@ileti.ziraatbank.com.tr>" (likely spoofed)
Received: "from [81.161.229.123] (unknown [81.161.229.123]) "
Date: "20 Jul 2022 07:19:14 +0200"
Subject: "18350, USD Swift Bildirimi"
Attachment: "Ziraat Bankasi Swift Mesaji.r19"
Intelligence
File Origin
# of uploads :
1
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-07-20 07:10:11 UTC
File Type:
Binary (Archive)
Extracted files:
25
AV detection:
9 of 40 (22.50%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot5494870549:AAFqJ3pl45pRPAhsTFTvUnE7bYKeMthsNRw/sendDocument
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.