MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cb896d15f24c9bba17962ab9ef10b8a3a4d332ec8a6823495c3435b6a20353a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 5cb896d15f24c9bba17962ab9ef10b8a3a4d332ec8a6823495c3435b6a20353a
SHA3-384 hash: eec255b92b144381a386e24827e8abb740ce6ba9e7409e326b818005e1a1979540897ced3b009069c078bab9ba73bf4d
SHA1 hash: 682059c98806bb4e09f61d0d686173de5879ad81
MD5 hash: 7c4610b93928f04f579406093a4a8241
humanhash: oxygen-zulu-potato-asparagus
File name:Clipper.bin
Download: download sample
Signature AgentTesla
File size:50'176 bytes
First seen:2020-09-21 10:09:52 UTC
Last seen:2020-09-21 10:43:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 1536:WEQdxuTpjcsxnyGRfu7UGHrGXlQoC/D5q:WHyTpVRggQGXJaU
Threatray 41 similar samples on MalwareBazaar
TLSH 1133D6027B8B0717D828657140FB143013F2AB8F5AB3D79A7D4853CD8E426E6FE89B46
Reporter JAMESWT_WT
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Enabling the 'hidden' option for analyzed file
Creating a window
Sending a UDP request
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary contains a suspicious time stamp
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.ClipBanker
Status:
Malicious
First seen:
2020-09-21 01:27:53 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Drops startup file
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments