MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51de766b58a0bc42cddc5a5c347279b788271633f5a99d83a64d9c9c7ea77869. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 2 File information 3 Yara 3 Comments

SHA256 hash: 51de766b58a0bc42cddc5a5c347279b788271633f5a99d83a64d9c9c7ea77869
SHA3-384 hash: 2ddadfc601e3773da3309a38c09f4922b1c5ef2a1745dc0524a5859375de4a91f3b8b5dcba75cc5fe1badfb4ac4865a4
SHA1 hash: b9eee6b483bbb3e48424855878de759fd2737ca5
MD5 hash: e1e1c7046dfb51248e7b0e34a65cd326
humanhash: mountain-november-six-cat
File name:copia_de_la_factura.exe
Download: download sample
Signature AgentTesla
File size:925'696 bytes
First seen:2020-06-30 12:34:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 175f794d98c9dcb0b47ae1ab1087c22c
ssdeep 12288:61JUuXUn6wUN4KSgqJ6wWska30/jgrTfz8BYnKFvkpzoMTKstzxPWM5v9xRvznlw:qOPXUWD6wEc0bp8RoMTKGNVHBl8vKe
TLSH B7158D22E2D28837D1732A788D5BB3A59836BE103D7858867FE90D0C5F786417D35EB2
Reporter @abuse_ch
Tags:AgentTesla exe


Twitter
@abuse_ch
Malspam distributing AgentTesla:

HELO: server.linux95.papaki.gr
Sending IP: 159.69.67.170
From: valeri A <info.serret@uem.es>
Subject: Remesas de pago
Attachment: copia_de_la_factura.7z (contains "copia_de_la_factura.exe")

AgentTesla FTP exfil server:
ftp.is-kagrup.com:21

AgentTesla FTP exfil user name:
md@is-kagrup.com

Intelligence


Mail intelligence
Trap location Impact
Global Low
# of uploads 1
# of downloads 29
Origin country US US
CAPE Sandbox Detection:n/a
Link: https://www.capesandbox.com/analysis/17148/
ClamAV No detection
CERT.PL MWDB Detection:agenttesla
Link: https://mwdb.cert.pl/sample/51de766b58a0bc42cddc5a5c347279b788271633f5a99d83a64d9c9c7ea77869/
ReversingLabs :Status:Malicious
Threat name:Win32.Trojan.Kryptik
First seen:2020-06-30 12:36:08 UTC
AV detection:25 of 31 (80.65%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   8/10
Malware Family:n/a
Link: https://tria.ge/reports/200630-n4b14ayen2/
Tags:spyware
VirusTotal:Virustotal results 38.36%

Yara Signatures


Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:win_agent_tesla_w1
Author:govcert_ch
Description:Detect Agent Tesla based on common .NET code sequences

File information


The table below shows additional information about this malware sample such as delivery method and external references.

a5ef959ddfdbc003ae5a9e3fa5bbc865

AgentTesla

Executable exe 51de766b58a0bc42cddc5a5c347279b788271633f5a99d83a64d9c9c7ea77869

(this sample)

  
Dropped by
MD5 a5ef959ddfdbc003ae5a9e3fa5bbc865
  
Delivery method
Distributed via e-mail attachment

Comments