MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7be39c8246f55171ba65e5b2f7a9df7c7902bef93972f0a892491589ed7b37e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 7be39c8246f55171ba65e5b2f7a9df7c7902bef93972f0a892491589ed7b37e6
SHA3-384 hash: 3d3c61b9040c01fda32e9181e27c340ff2899b676061cfb23a79619cc36a08a7b13c33d81706e78da421f8264d3ead6a
SHA1 hash: c56d7d78087a5fa8723c5addaf3e95406180b914
MD5 hash: 41ac12f8af3d99a84841b3b55ad3c31a
humanhash: beryllium-lake-dakota-ack
File name:MV AMIS WEALTH CTM USD 40,000.zip
Download: download sample
Signature AgentTesla
File size:775'621 bytes
First seen:2022-01-25 08:30:46 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:V3lg1B3/vLkvqCS55/+5ww8ura6kleSbYQ19C1ewRrecF4c9CDiDRT3325y4wjES:mNYSjL/Wwwl7hSnW9Ua4cAc325y4wgS
TLSH T192F43360AD733678F5E536ED84DC3211093646F5EA368E685CADCB584FE2CA7047A8C3
Reporter cocaman
Tags:zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
148
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Injuke
Status:
Malicious
First seen:
2022-01-25 08:31:10 UTC
File Type:
Binary (Archive)
Extracted files:
14
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Drops file in Drivers directory
AgentTesla Payload
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot2092755520:AAFUT-2SMjjd39KTAiZYfccbaFzWXamzjz4/sendDocument
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 7be39c8246f55171ba65e5b2f7a9df7c7902bef93972f0a892491589ed7b37e6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments