MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52e50c048801cc2900db801eca5ffc68ca645e024b41a7d06a5d71915a2626ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 52e50c048801cc2900db801eca5ffc68ca645e024b41a7d06a5d71915a2626ab
SHA3-384 hash: 090c6f1331a4e6dffafe36c608e98265dc732a5d0a27159d52684202c00ad34e0739c796fd32e01e8d2275fa382c2a70
SHA1 hash: 87d82f7729ae9cc928151b51106c10fb3cd63b72
MD5 hash: 0beee0b9e32e0a24aecd32f4b4855417
humanhash: stairway-fillet-mobile-chicken
File name:Inquiry-9840388.zip
Download: download sample
Signature AgentTesla
File size:648'447 bytes
First seen:2021-04-19 16:52:24 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:9U320MhjKKQSE9m6JJ+j/kMVB+PlJ/tLnzTPp0UA09e/cd96sMnND:9UZMhuKuA6cAPl9trh0UA04/cd96TND
TLSH 84D4237177B2A2DCBCDBAE85C57D3490D8034CE713CA9E90C9B08BF5D5A2D82142A2DD
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 52e50c048801cc2900db801eca5ffc68ca645e024b41a7d06a5d71915a2626ab

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments