MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 247331dfc1ff971623e169a302fc2c8eb5c895573d055ca1b985d6ac1cfd6720. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 247331dfc1ff971623e169a302fc2c8eb5c895573d055ca1b985d6ac1cfd6720
SHA3-384 hash: 7cad1be36f2922514a9a891987b29823cb057b13a2be701d92b65a9d089e0bac5f60379ebb51dc2d748302449d0b0f9e
SHA1 hash: e8a6712e74a8a7c3ef9e7d57763f71a7de2a7bd4
MD5 hash: 543d7c361e4d7f368b5d0d6313bd494f
humanhash: apart-glucose-lion-timing
File name:Payment Advice doc.ace
Download: download sample
Signature AgentTesla
File size:509'638 bytes
First seen:2022-06-28 10:12:58 UTC
Last seen:Never
File type: ace
MIME type:application/octet-stream
ssdeep 12288:wcdK7gG0WSG/vYhvuhYga8uwi99gQrk+XSdh/OJ4KX:wcdfGcOWmja8wHrkw2c
TLSH T140B4232D3220A96E59FB367AFF0C4D5BFA56345166DF06C341308A5F2754EE702A2BA0
Reporter JAMESWT_WT
Tags:ace AgentTesla HSBC

Intelligence


File Origin
# of uploads :
1
# of downloads :
179
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
ByteCode-MSIL.Infostealer.Fareit
Status:
Malicious
First seen:
2022-06-28 10:13:09 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
12 of 41 (29.27%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
suricata: ET MALWARE AgentTesla Exfil Via SMTP
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ACE_Containing_EXE
Author:Florian Roth - based on Nick Hoffman' rule - Morphick Inc
Description:Looks for ACE Archives containing an exe/scr file

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments