MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b58992b26f47023772b4651fb523236b890894ac1fbafa7832ce0937b5fcfb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4b58992b26f47023772b4651fb523236b890894ac1fbafa7832ce0937b5fcfb0
SHA3-384 hash: 3f953adc3996a161015d24f53f3ef9683b877ccf0c22dfec15050cacea18b57c77a4c116d11a8e2ce4f93ebc171f01a1
SHA1 hash: dc037564a147baf45a862dc594da01460cfbac9c
MD5 hash: b4563d3be50c385f1761b0786b607520
humanhash: cardinal-undress-tango-may
File name:Consignment Details_pdf.rar
Download: download sample
Signature AgentTesla
File size:393'813 bytes
First seen:2021-05-05 05:31:34 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:Jn5ZrTNBsONpXZJwPNzLlDBCtB1CXZWBrwI:rqGpXZaVzLlDBCtB1QZCwI
TLSH BA84238F07788BD5399FBF1C61E81A96CE22BCF52257761F44E680EDDB29A7004541F8
Reporter cocaman
Tags:rar TNT


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?B?VE5UIEV4cHJlc3MgSU5Dwq4=?= <support@240.0.mxvmno.cf>" (likely spoofed)
Received: "from postfix-inbound-9.inbound.mailchannels.net (inbound-egress-6.mailchannels.net [199.10.31.238]) "
Date: "4 May 2021 16:00:26 -0700"
Subject: "TNT CONSIGNMENT NOTIFICATION: AWB 9899691012 Clearance Doc"
Attachment: "Consignment Details_pdf.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.ZmutzyPong
Status:
Malicious
First seen:
2021-05-05 05:32:12 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
17 of 47 (36.17%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 4b58992b26f47023772b4651fb523236b890894ac1fbafa7832ce0937b5fcfb0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments