MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4803ecfe4efdf702ac32d69332195b1d12241bffdf83f9f015c67743b4ec32c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4803ecfe4efdf702ac32d69332195b1d12241bffdf83f9f015c67743b4ec32c8
SHA3-384 hash: 714b4820aa99dde99af034a59523ecc82e9604634b480a4cd890ff524ee93a2503af22134bb2215f8030c3970544235a
SHA1 hash: ba2e833837cb5a01c0472ac77438ca4975b472a0
MD5 hash: edb055c3a841faa9c9d42032ed33be8c
humanhash: carbon-queen-may-finch
File name:Payment receipt.exe
Download: download sample
Signature AgentTesla
File size:730'112 bytes
First seen:2020-05-12 05:56:33 UTC
Last seen:2020-05-12 07:25:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:2YiEZPyxpaS1Vm/aRj4iCHPk2CT/vfQv/JmizOkYhrRr4yXU4wTcCP:/PGpaS7E2jvfUVzTYhrR0yXU4wTP
Threatray 73 similar samples on MalwareBazaar
TLSH 24F4221DDFF89B76FFBD5A32D93206006B3256CAA272D30E0C805AD51E9B19312467DE
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: franceloc.fr
Sending IP: 185.236.202.149
From: Finance manager<bastide@franceloc.fr>
Subject: Payment receipt
Attachment: Payment receipt.zip (contains "Payment receipt.exe")

AgentTesla SMTP exfil server:
smtp.gmail.com:587

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Agensla
Status:
Malicious
First seen:
2020-05-12 06:36:01 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
23 of 31 (74.19%)
Threat level:
  2/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger ransomware spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
MassLogger
MassLogger Main Payload
MassLogger log file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

43ce6c6b56a5be2b5f13d846c0ff7240

AgentTesla

Executable exe 4803ecfe4efdf702ac32d69332195b1d12241bffdf83f9f015c67743b4ec32c8

(this sample)

  
Dropped by
MD5 43ce6c6b56a5be2b5f13d846c0ff7240
  
Delivery method
Distributed via e-mail attachment

Comments