MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a38bd86c919173196730db4e0189397c14d5c8d5610dcd988e73f044e452436. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 2a38bd86c919173196730db4e0189397c14d5c8d5610dcd988e73f044e452436
SHA3-384 hash: 0aeb2be66b9b3873f217cc3712f827cad9950b9913226ccb17b589d2367118c011ef054091a514e3419db3f8d4b3cb14
SHA1 hash: 6f94b5f8fdd777224c77880f4467744658c60793
MD5 hash: 9776f1a4c4320fd92a7f640293d35a03
humanhash: three-nuts-california-fourteen
File name:InquiryNo 04032025.zip
Download: download sample
Signature AgentTesla
File size:4'345 bytes
First seen:2025-03-04 16:41:13 UTC
Last seen:2025-03-05 07:34:45 UTC
File type: zip
MIME type:application/zip
ssdeep 96:aMnMfVF/LtyA7FNe5HDUExh/O2K/Xs0RsHMHTFQsi:QtNe9UErOVs0TxQF
TLSH T125919F803243F95FD81A85623AFAD5FAD48DCD51A761B8C20943CC14EB89A3B48867F7
Magika zip
Reporter cocaman
Tags:144-91-92-251 45-155-54-22 AgentTesla sendxsenses--vetrys-shop Spam-ITA zip


Avatar
cocaman
Malicious email (T1566.001)
From: "info@sindaoil.ae" (likely spoofed)
Received: "from postfix-inbound-v2-9.inbound.mailchannels.net (inbound-egress-7.mailchannels.net [23.83.220.5]) "
Date: "4 Mar 2025 08:40:41 -0800"
Subject: "Inquiry No 04032025"
Attachment: "InquiryNo 04032025.zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:InquiryNo 04032025.vbe
File size:11'490 bytes
SHA256 hash: 86d0add359a099061caa3450bf91bed728623f2d574eeb80956e93bbc09733fb
MD5 hash: 8d833561442e31437abd896cce1a4bef
MIME type:application/octet-stream
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme shell lien
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-03-04 13:30:41 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in System32 directory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 2a38bd86c919173196730db4e0189397c14d5c8d5610dcd988e73f044e452436

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments