MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 797bca58afc236dc09c24c62d8faea37d2fe7817133138ade685d351130c756a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: 797bca58afc236dc09c24c62d8faea37d2fe7817133138ade685d351130c756a
SHA1 hash: 6748a70f93de4a6b2dca03f519e300994ec1358d
MD5 hash: 47692cc11d52100b45d8dc51bfd0f1ad
File name:47692cc11d52100b45d8dc51bfd0f1ad.exe
Download: download sample
Signature AgentTesla
File size:537'600 bytes
First seen:2020-05-22 15:00:53 UTC
Last seen:2020-05-22 15:48:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:76rgl/DXIUb6c87IIa1ZdMbmDU3rG4ohNYEyCV7M9pjcj7xffGQWh:76EiUbT87D+7MbmD8r2
TLSH 6DB48DAC765076DFC96BC936CAA81C64EB1174BB430BD203902319EE9A0DA97DF145F3
Reporter @abuse_ch
Tags:AgentTesla exe


Twitter
@abuse_ch
AgentTesla SMTP exfil server:
smtp.yandex.com:587

Intelligence


Mail intelligence No data
# of uploads 2
# of downloads 29
Origin country US US
ClamAV SecuriteInfo.com.Trojan.Siggen9.46984.30531.2311.UNOFFICIAL
VirusTotal:Virustotal results 52.05%

Yara Signatures


Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:win_agent_tesla_w1
Author:govcert_ch
Description:Detect Agent Tesla based on common .NET code sequences

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments