MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | 7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4 |
|---|---|
| SHA3-384 hash: | df05d156356e1a221036624f210af84a70c0f6f976fc2b3b85cfacdd895b2c6e4daed657f8c658c17bc268dd527b94d6 |
| SHA1 hash: | 43766cdc8f6098f5f0f5b939aef317a7d446bbcf |
| MD5 hash: | fde8031b0f164873a0f3dbb0ec3f4440 |
| humanhash: | mountain-nine-mexico-december |
| File name: | AWB & Shipping Documents.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 772'608 bytes |
| First seen: | 2024-01-31 10:40:57 UTC |
| Last seen: | 2024-01-31 15:01:08 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:sVlIAYQ4+HqJ4MiIizlcDgvCGjkpB5g1EmFYr/PqeVnJFcCszUR3SQb1aiKGtf:mIALW4MiIiSgaGjkDeYrnRlMs1x55J |
| Threatray | 5'167 similar samples on MalwareBazaar |
| TLSH | T108F4F1C5FA651761DC6A2BB51176D8300BA37C3F9030EA1C2ECA3EEB3A7B7420511967 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | d4c4c4d8ccd4f0c4 (63 x Formbook, 23 x AgentTesla, 8 x RemcosRAT) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
f7e5bc980e9a7659ba8aedcb0e5ec208b13d807657ceaeb276db2f5ddeb0b2cf
4e531e34c8132457b497653d69f5efe16c95a651aa0a47e8ab8f56ad1f35b51d
052b4eda2c31d34095e1fc77adf582681b3659a77cfb5ed167af380d6f08d9db
f7cdedd0c2255acdeec852eac9d0f27167cc48eff1d92d34fe099f3c7f21ae9a
affaae9ae22127b74b0ff16f553a8de07baf4b4a72d4b179d5adf9775a65f4ff
135a046874c7621664f5259d83120e71c426fb40d54104a27a6fd25cb5d2f9c9
4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d
7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4
37b76e89fcb5bbc28f1984b6bdd58a16e034dc49357dbced7d2aa1a6a25daa17
cd5afb25fb90fab49b4623b7d2005004fabec7c32685c3ac056919e56aaed18c
089463f7438aada6e397465f3951fd3ac4b5cdae44e8e88e6bc7620005b2b418
32f09ba1f13e6344e1eee8a59c0111e01fa260fb003260e95e42d36c849894c9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.