MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26a05ed93c0b2379a682345862c3043bf6881542cc5c595e6e07f2fd4b0c76a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 26a05ed93c0b2379a682345862c3043bf6881542cc5c595e6e07f2fd4b0c76a9
SHA3-384 hash: 84af864aaa8f89fec8f4bf45d104283ffcb3d5711ef6f015a9549ef49b608ac344266f5e516f1b2728ce6ec7fe056daa
SHA1 hash: 3d15bb42d6ba621fcc8abf12a059b66d51387af0
MD5 hash: bfc9fe70acd1cf755019a2b639129290
humanhash: juliet-summer-sad-zebra
File name:quotation.r15
Download: download sample
Signature AgentTesla
File size:1'031'905 bytes
First seen:2021-06-23 05:25:32 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:hefP81yVV08iV+TgJmg2vwvfW6kRqi/d0:Ql0f8D1ovfW6eqiS
TLSH 152533FC415E58BBC4C2A7A3BCF01CFA79262C8DD2B98151A5026858C04A4937BF6D7F
Reporter cocaman
Tags:AgentTesla r15 rar


Avatar
cocaman
Malicious email (T1566.001)
From: ""Renuka "<renuka@vrlogistic.com" (likely spoofed)
Received: "from vrlogistic.com (unknown [185.222.57.200]) "
Date: "22 Jun 2021 17:42:05 -0700"
Subject: "Quotation/ENQUIRY"
Attachment: "quotation.r15"

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-23 01:56:56 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
11 of 46 (23.91%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops file in Drivers directory
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 26a05ed93c0b2379a682345862c3043bf6881542cc5c595e6e07f2fd4b0c76a9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments