MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24852466c25cf878fb11e5cc54141c93286d961d51d2e6c419e6b581ccbf35cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: 24852466c25cf878fb11e5cc54141c93286d961d51d2e6c419e6b581ccbf35cc
SHA3-384 hash: 32f91aa1aafd7f3e94ae4f13a793eb14fe5ed188b0234f3b81c295261025026a2b53e1679f620489d5d1657ff6b29758
SHA1 hash: 22f2816e2d99c42d7a63b6f849f1dcabce610e87
MD5 hash: 40facfb172876143ded5bc7b1c195266
humanhash: yellow-aspen-kansas-failed
File name:PO‮fdp.7z
Download: download sample
Signature AgentTesla
File size:818'912 bytes
First seen:2023-10-25 10:57:35 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:aZP+DFkEbYL5LIuiTAIXWGBQRdpmy3pS/x56QX44tXba4M8v6Csn3SdqK+5flGU4:a8DULtIuSAXpmyZucQomFRvFspDflv4
TLSH T1410523FBB57A4E81FB541E70F914491CA62B8CA4A387CFBD1D2490FE6D125BA70F5009
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Reporter cocaman
Tags:7z AgentTesla


Avatar
cocaman
Malicious email (T1566.001)
From: ""Manish Kumar Rao" <manishkr@jayanita.com>" (likely spoofed)
Received: "from jayanita.com (unknown [193.42.33.119]) "
Date: "20 Oct 2023 14:07:30 +0200"
Subject: "NEW PO: 276636"
Attachment: "PO‮fdp.7z"

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:PO‮fdp.exe
File size:1'073'664 bytes
SHA256 hash: cfadc51764727f6575af7a0c5ca579c99bc062ce94d67dbb844f4a44bd1d1711
MD5 hash: 222eb77a3852d898dee7a7b026302cf3
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Zilla
Status:
Malicious
First seen:
2023-10-20 10:09:24 UTC
AV detection:
19 of 36 (52.78%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla evasion keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
AgentTesla
Malware Config
C2 Extraction:
https://discord.com/api/webhooks/1164647148105769020/8usoHRGoO-AonCx102bzk6qsKGrK-STJRJkdO4oOxLs749SD82CnugdL5-ebUAJQBDcA
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 24852466c25cf878fb11e5cc54141c93286d961d51d2e6c419e6b581ccbf35cc

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments