MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e7cf8b50b0888244fa3734343408fee6f0b53b1c8e87e9788e5c1d914c4e56c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 1e7cf8b50b0888244fa3734343408fee6f0b53b1c8e87e9788e5c1d914c4e56c
SHA3-384 hash: 07711c87f56ab908c0e54c411ad72a629b1762c0eb1d2cedbced48223de8e886451b6685f91ebc8831e0d4c6707b8fb7
SHA1 hash: 684385bc11537b2660869794ec8b50270dbd89d1
MD5 hash: 518e696756b87c0260e0a6dbdd9602c3
humanhash: magnesium-sad-freddie-connecticut
File name:Ziraat Bankasi Swift Mesaji.r19
Download: download sample
Signature AgentTesla
File size:780'653 bytes
First seen:2022-07-20 07:09:37 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:s3hxpd/UzbefC4vhW6uX/qIWdod1KracvJcnqBQZc3FMbgENAJOj/xYg98hu:sRx0zbefjvU6arGrhcnqB3e0JO5Ykku
TLSH T1FEF423D1A368BD2D01502F3703B3E1DD816CCB96FC69A4E8591077987FB1DD80B86AA7
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:AgentTesla r19 rar SWIFT


Avatar
cocaman
Malicious email (T1566.001)
From: "ZIRAAT BANKASI <ziraatbank@ileti.ziraatbank.com.tr>" (likely spoofed)
Received: "from [81.161.229.123] (unknown [81.161.229.123]) "
Date: "20 Jul 2022 07:19:14 +0200"
Subject: "18350, USD Swift Bildirimi"
Attachment: "Ziraat Bankasi Swift Mesaji.r19"

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-07-20 07:10:11 UTC
File Type:
Binary (Archive)
Extracted files:
25
AV detection:
9 of 40 (22.50%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot5494870549:AAFqJ3pl45pRPAhsTFTvUnE7bYKeMthsNRw/sendDocument
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 1e7cf8b50b0888244fa3734343408fee6f0b53b1c8e87e9788e5c1d914c4e56c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments