MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 20
| SHA256 hash: | 66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6 |
|---|---|
| SHA3-384 hash: | e2c834df67356f55902599932027cef70445e0e3a542276372bb5a08b2df1bd225a4ae610bb6e590e687d681d7d91726 |
| SHA1 hash: | a5a24c8aeef29107cb3a72acbe45d77274ee3cf9 |
| MD5 hash: | c418187a5268d408094b89aa79e3a5a2 |
| humanhash: | harry-montana-eighteen-fifteen |
| File name: | z17invoice.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 688'128 bytes |
| First seen: | 2024-09-04 10:59:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:vvBKYvI8cu/ZRrJt6cGMJIfAXL2RR3IKE0M8wkFoJJprYuBC5o:3OqLrJt3lJbC/3IKUOoJJpfg5 |
| TLSH | T1B9E402682A4AE503C65147794FB2F2B9263C5DEDB811D3639FEDAEEFF926C044D04281 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
BRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.