MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6d23f275f23eb59ce83d71ebbb1bce6f7023cfe8c12bdcbc05433c12ac48c176. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 7
| SHA256 hash: | 6d23f275f23eb59ce83d71ebbb1bce6f7023cfe8c12bdcbc05433c12ac48c176 |
|---|---|
| SHA3-384 hash: | 88d807d78b5baa167e74e13594064e37753a71e59bd8d637c3defe6a9e83bec425564b7583e70dff16aff8e871c10330 |
| SHA1 hash: | 37a52a9e4be79b8feae6475539753703c6e1a322 |
| MD5 hash: | 19001d8db5889077cddc637d2b6a7e76 |
| humanhash: | connecticut-foxtrot-zebra-eight |
| File name: | PB2EF396HB2Z.GZ |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 9'433 bytes |
| First seen: | 2023-06-21 11:30:26 UTC |
| Last seen: | 2023-06-21 11:44:16 UTC |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 192:sDUcVHmV3rv/G4uZs6zjN/t7igrVgWNTCWBKjWMr3tbKscWeqAsh1ap:sJQvO4+s6VteiNiWq3t1crqAcO |
| TLSH | T1B412AE2231AFA87B217807FF27D48393214090E65B1446AB81E7A57FD27230DF785B2B |
| TrID | 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1) 38.4% (.RAR) RAR compressed archive (gen) (5000/1) |
| Reporter | |
| Tags: | AgentTesla gz |
cocaman
Malicious email (T1566.001)From: "Nur Fadila<equote2@venture.com.sg>" (likely spoofed)
Received: "from [141.98.10.53] (unknown [141.98.10.53]) "
Date: "21 Jun 2023 13:44:01 +0200"
Subject: "Quote Request-URGENT"
Attachment: "PB2EF396HB2Z.GZ"
Intelligence
File Origin
# of uploads :
2
# of downloads :
118
Origin country :
CHFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | PB2EF396HB2Z.exe |
|---|---|
| File size: | 17'920 bytes |
| SHA256 hash: | 66c869949719a64950f5aaf24a687b04bdc73d8690264cad8861716129f3c216 |
| MD5 hash: | c8b1d37a3da721f6f73b95294e4eef86 |
| MIME type: | application/x-dosexec |
| Signature | AgentTesla |
Vendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-06-21 00:19:26 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
11 of 36 (30.56%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
AgentTesla
gz 6d23f275f23eb59ce83d71ebbb1bce6f7023cfe8c12bdcbc05433c12ac48c176
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.