MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 73b63a59ea3c5c6f049420fb7a4a4dc4e91036c24e2b25bae406aac1f56a1812. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 9
| SHA256 hash: | 73b63a59ea3c5c6f049420fb7a4a4dc4e91036c24e2b25bae406aac1f56a1812 |
|---|---|
| SHA3-384 hash: | b2d08ed14b1bb655bcfb62ca42ef44b1a7ccfb70e92033a5d3d91dadae1dc769223d8ba47581e53dc46485990085de57 |
| SHA1 hash: | 4ebb9876723c2fc5fda46b098094cf0104efac55 |
| MD5 hash: | 3b970c76dbc74cd9b119f487a22c1683 |
| humanhash: | fifteen-west-winter-burger |
| File name: | z1ShippingDocs_waybillNO2005xxx351.wsf |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 193'844 bytes |
| First seen: | 2025-01-28 07:30:06 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/xml |
| ssdeep | 3072:z/zQ6Vv//riU/tEqZjCwNZiU/tEyWiU/tEqZjCwNZiU/tEAI6:0U/tESLNQU/tEylU/tESLNQU/tEa |
| TLSH | T1DF146B896645DAD647733A74802F2706BDD8CA132D28E0A478DFCBE13774994E2F3678 |
| TrID | 50.0% (.WSF) Windows Script File (8000/1/2) 31.2% (.XML) Generic XML (ASCII) (5000/1) 18.7% (.HTML) HyperText Markup Language (3000/1/1) |
| Magika | txt |
| Reporter | |
| Tags: | AgentTesla wsf |
Intelligence
File Origin
# of uploads :
1
# of downloads :
100
Origin country :
BRVendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
xtreme shell overt
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
masquerade obfuscated
Verdict:
Suspicious
Labled as:
Trojan.Script.ExpKit
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
23 / 100
Signature
Potential malicious VBS script found (has network functionality)
Behaviour
Behavior Graph:
Score:
34%
Verdict:
Susipicious
File Type:
SCRIPT
Detection(s):
Suspicious file
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection discovery execution keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Malware Config
C2 Extraction:
https://api.telegram.org/bot6050556352:AAE_-mublQ2CllMbT9xkQVBjSBbdvdYR1kM/
Dropper Extraction:
https://res.cloudinary.com/daxwua63y/image/upload/v1737543662/new_image_h8btwc.jpg%20
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.