MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4771ad2ea30c1ac1dbf9e6358478b9fd0d6525a4b9c19e0610f7accd1d1151af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 4771ad2ea30c1ac1dbf9e6358478b9fd0d6525a4b9c19e0610f7accd1d1151af |
|---|---|
| SHA3-384 hash: | b7febbee83156371e9e00af942c3d2750ec77f5d15cfb18f260e70473b85b484730f47ff41d2736030c2c1de7e15b001 |
| SHA1 hash: | d3edafbb0025f024e48ab7dd7c3161d5f6081198 |
| MD5 hash: | 4b7d782e9374dbd44819b941cf0ebdde |
| humanhash: | september-floor-arkansas-lactose |
| File name: | Document 13042020-245784672009856905957758598.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'562'112 bytes |
| First seen: | 2020-04-13 08:27:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f2536b94028a679402c21327e48c73db (1 x AgentTesla) |
| ssdeep | 24576:odG8BXzevU130jYxANjNT6FQm1aLHhW4EhGqT+NuJsHKq7+tWBvJ/h6D4tt5VqzT:2G8VeK72LrEhjqbKqatWj/h6Ea |
| Threatray | 9'074 similar samples on MalwareBazaar |
| TLSH | 1A75D182F6C190F1EA910071BD65D7AE5F327C118D20EA17E7D83E1F8ABF5406A2B275 |
| Reporter | |
| Tags: | AgentTesla COVID-19 exe |
abuse_ch
COVID-19 themed malspam distributing AgentTesla:HELO: server.eurolotteria.com
Sending IP: 142.4.9.187
From: Managing Director<md@victim-domain>
Subject: Evidence Document Containing Staff Misconduct During This Period Of COVID-19 Pandemic 13-04-2020
Attachment: Document 13042020-245784672009856905957758598.img (contains "Document 13042020-245784672009856905957758598.exe")
AgentTesla SMTP exfil server:
smtp.maizinternational.com:587 (208.91.199.223)
AgentTesla SMTP exfil email address:
sales@maizinternational.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Agensla
Status:
Malicious
First seen:
2020-04-13 08:35:22 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
23 of 31 (74.19%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 9'064 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CreateStreamOnHGlobal |
| GDI_PLUS_API | Interfaces with Graphics | gdiplus.dll::GdipAlloc |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetSystemInfo |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleInputW KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleInputW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetConsoleCtrlHandler KERNEL32.dll::SetConsoleCursorPosition |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileMappingW KERNEL32.dll::CreateFileW KERNEL32.dll::CreateFileA KERNEL32.dll::DeleteFileA KERNEL32.dll::DeleteFileW KERNEL32.dll::ReadDirectoryChangesW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryInfoKeyW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_SCARD_API | Supports Windows Smart Card | WinSCard.dll::SCardEstablishContext |
| WIN_SOCK_API | Uses Network to send and receive data | WS2_32.dll::WSAIoctl WS2_32.dll::WSARecv WS2_32.dll::WSARecvFrom WS2_32.dll::WSASocketW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::AppendMenuW USER32.dll::CreateMenu USER32.dll::FindWindowA USER32.dll::OpenClipboard USER32.dll::PeekMessageW USER32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.