MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1eadd6ee510489020381a9be7fb6691944ca613e54c6009ac8abad0d19e5af67. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 1eadd6ee510489020381a9be7fb6691944ca613e54c6009ac8abad0d19e5af67
SHA3-384 hash: 527fbe81744741ae051066f98dd1039c879905ddb68c148e5946febc5a6b92437ec5cea4b3a2398d1b803d2e7ed802d7
SHA1 hash: 5f01644e6bff56d43679c994c21a6b9ffed8a720
MD5 hash: 59350f8bb02fd4fee4fa75d54ab35687
humanhash: golf-connecticut-tango-winter
File name:PAYMENT INSTRUCTIONS COPY.zip
Download: download sample
Signature AgentTesla
File size:580'331 bytes
First seen:2023-02-21 09:53:04 UTC
Last seen:2023-02-21 09:54:53 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:8HUxvzFD8tzCn6315DuU5zDtozs3o4pgWTDY1v9KxYrE:8HUxruun6TuetQhw4IxIE
TLSH T1B9C423DBA583D8796AFEC99D1FBB91D51818004028D8E4CB3BA75888F6D787066D1E33
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:payment zip


Avatar
cocaman
Malicious email (T1566.001)
From: "info@ekomilkhorizon.com" (likely spoofed)
Received: "from ekomilkhorizon.com (unknown [193.42.33.216]) "
Date: "21 Feb 2023 10:47:14 +0100"
Subject: "RE: PAYMENT INSTRUCTIONS"
Attachment: "PAYMENT INSTRUCTIONS COPY.zip"

Intelligence


File Origin
# of uploads :
3
# of downloads :
107
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:PAYMENT INSTRUCTIONS COPY.exe
File size:791'040 bytes
SHA256 hash: bbf7b8c0c3542188f9a8b62cd3c096ce43d9536b8a635c350c9e16e2ee6a0ead
MD5 hash: 93a41bdf1e19321e51965918a1339b08
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-02-21 09:53:09 UTC
File Type:
Binary (Archive)
Extracted files:
17
AV detection:
15 of 25 (60.00%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 1eadd6ee510489020381a9be7fb6691944ca613e54c6009ac8abad0d19e5af67

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments