MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7d3fa90e5406de233bac6088b8e17d4f9a3684f2320451e2a5ee9ddcf24896b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 7d3fa90e5406de233bac6088b8e17d4f9a3684f2320451e2a5ee9ddcf24896b4 |
|---|---|
| SHA3-384 hash: | b4a09e450e4c41f9508d9dcf89c1d158e2797241bab8300d0c53e07a70d93b9537e90326afe7abd6f8a7752ef2437a9a |
| SHA1 hash: | a55279be6d3407bd5958ca12c91d76590cfc3ed3 |
| MD5 hash: | ee38bb17f64c5b9ee7737fec3b5a553d |
| humanhash: | florida-berlin-hotel-montana |
| File name: | 9ebd3f0786d345654d23e2a5b46f518c.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 299'520 bytes |
| First seen: | 2020-03-26 15:28:10 UTC |
| Last seen: | 2020-03-26 15:43:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:rGjF2Lfxvfk78QQxVLKyWaqGwPhVI/+Px4o04PokCpX2bXoyT7:6Z2Lf1YjQFMrV/o0oyT7 |
| Threatray | 10'443 similar samples on MalwareBazaar |
| TLSH | 6E542B7D2B88B902F73D193289D1266112F194834D22CB4F6EC41FFD7E5B7CA294A396 |
| Reporter | |
| Tags: | AgentTesla exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=16hMimq1Y0istmMZ2IOgI7MGyJ1RhummA
Intelligence
File Origin
# of uploads :
2
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-03-26 15:36:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
26 of 31 (83.87%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'433 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
49a31ff79556056b1a8a15ca231da53d0e88258854deb0a2d101fe216db0121e
Dropped by
MD5 9ebd3f0786d345654d23e2a5b46f518c
Dropped by
MD5 d72dad341f8ce5dd54edfb3b6d35fce3
Dropped by
GuLoader
Dropped by
SHA256 49a31ff79556056b1a8a15ca231da53d0e88258854deb0a2d101fe216db0121e
Dropped by
SHA256 fcea108d837ea3b6bc1383bebfcd5f8bce074b03d8df4a792342fec7702d8649
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.