MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2239140094a7718ee18a8aab483b57ed1d57da9a26e6b77550ca721c9e5cded8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 12
| SHA256 hash: | 2239140094a7718ee18a8aab483b57ed1d57da9a26e6b77550ca721c9e5cded8 |
|---|---|
| SHA3-384 hash: | e7e06a127cfdcbb7c38bb57aabf4054afbde9a64769aa5f4dd94a7e4471e625ddea8319992ebaccbc996e9ae5874a311 |
| SHA1 hash: | b9930d140eb3cb1671ca99d8aef7511673fd6cca |
| MD5 hash: | bef5c963b4cae15a468b43b6925335b1 |
| humanhash: | seventeen-march-arizona-december |
| File name: | DHL0966779898.pdf__________________.hta |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 130'792 bytes |
| First seen: | 2023-10-26 12:11:53 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/html |
| ssdeep | 3072:oTl2u/UTiTwTITpfXdTKTYTwTBTNuWQtF5EK:oTl2u/PfXJ |
| TLSH | T10AD34B11259E609C70B37F631BDD79EA8F4FBBE1271BA0AA664403078F52E44CE95372 |
| TrID | 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1) 33.3% (.MP3) MP3 audio (1000/1) |
| Reporter | |
| Tags: | AgentTesla hta |
Intelligence
File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DKVendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Verdict:
Malicious
Labled as:
Valyria
Result
Verdict:
MALICIOUS
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell download and load assembly
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected zgRAT
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
ASCII
Threat name:
Win32.Trojan.Valyria
Status:
Malicious
First seen:
2023-10-25 17:16:23 UTC
File Type:
Text (VBS)
AV detection:
9 of 38 (23.68%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
zgrat
Score:
10/10
Tags:
family:zgrat rat
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Detect ZGRat V1
ZGRat
Malware Config
Dropper Extraction:
https://imageupload.io/ib/ekWgHWjP3arvUq7_1698166097.jpg
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.