MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 50f42960eb882be0f35a1f4d15edb0ab6e8aea2211dbae7c358288f2b7846fba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 50f42960eb882be0f35a1f4d15edb0ab6e8aea2211dbae7c358288f2b7846fba |
|---|---|
| SHA3-384 hash: | 99d98878b1a538f09192d7e9c8712bbcf03caa9dc5faaee3ab2a70256cd01108ccfc66fc5243cf0318d2bea7f57ee367 |
| SHA1 hash: | ca8f5d6a121123165486ddcbe4450d151ecbbff9 |
| MD5 hash: | 716c1b40449ab88d7ee045b6628a27e7 |
| humanhash: | finch-blue-don-comet |
| File name: | ford0104_smallzzzz originnn_11cr3.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'221'632 bytes |
| First seen: | 2020-04-02 04:29:58 UTC |
| Last seen: | 2020-04-02 06:08:41 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ab4d4b8e2d3020b940f06432922fc22d (1 x AgentTesla) |
| ssdeep | 12288:DbTR3uVHAH/9NZTJ0NpYFeDcDWSmz+uSIqh+FK4T7YyFZU8TpQME1HkJVjq7w+17:F+AAQ4TTFLlRJd8Uv5c0pmWa029Vfs6 |
| Threatray | 10'092 similar samples on MalwareBazaar |
| TLSH | 4045EF50FA81C072F0B311B156BB87B65D39BD31072655C7E3D43E6A2E342D1BA393AA |
| Reporter | |
| Tags: | AgentTesla COVID-19 exe |
abuse_ch
COVID-19 themed malspam distributing AgentTesla:HELO: wbsc.com.na
Sending IP: 45.143.222.201
From: HR@xxx <sg@wbsc.com.na>
Subject: (UPDATE COVID-19) CLOSE DOWN ORDER FROM CDC 4.1.2020
Attachment: COVID-19 CLOSE DOWN ORDER 4.1.2020.img (contains "ford0104_smallzzzz originnn_11cr3.exe")
AgentTesla SMTP exfil server:
smtp.agifreiqht.com:587 (208.91.199.224)
Intelligence
File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Dropback
Status:
Malicious
First seen:
2020-04-02 04:35:44 UTC
File Type:
PE (Exe)
Extracted files:
36
AV detection:
24 of 31 (77.42%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'082 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CoFreeUnusedLibraries |
| MULTIMEDIA_API | Can Play Multimedia | MSVFW32.dll::DrawDibOpen WINMM.dll::mmioAscend WINMM.dll::timeGetTime |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::ImpersonateLoggedOnUser |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle wer.dll::WerReportCloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetConsoleTitleA KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleScreenBufferInfo KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::MoveFileExA KERNEL32.dll::GetSystemDirectoryA VERSION.dll::GetFileVersionInfoSizeA VERSION.dll::GetFileVersionInfoA |
| WIN_CRYPT_API | Uses Windows Crypt API | ADVAPI32.dll::CryptAcquireContextA ADVAPI32.dll::CryptCreateHash ADVAPI32.dll::CryptEncrypt ADVAPI32.dll::CryptGetHashParam ADVAPI32.dll::CryptHashData ADVAPI32.dll::CryptImportKey |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegOpenKeyExA |
| WIN_SOCK_API | Uses Network to send and receive data | WS2_32.dll::freeaddrinfo WS2_32.dll::getaddrinfo WS2_32.dll::WSAIoctl |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.