MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 832b94638ad0196de53e869de9d93e632e89f4b5115e0919f0977a10eb30e64d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 832b94638ad0196de53e869de9d93e632e89f4b5115e0919f0977a10eb30e64d
SHA3-384 hash: fe7ea5859e3c455e9bfea8136c6d5511b3217af984a10ee1fbf0c33dd219c6f155a07695a42e073e6d8c5fceddfde227
SHA1 hash: a062d447ea139f90f566c25eee732011860586ac
MD5 hash: 5711672deb579b3a9908ad3926eef461
humanhash: kilo-pasta-river-louisiana
File name:payment slip.exe
Download: download sample
Signature AgentTesla
File size:15'728'640 bytes
First seen:2020-11-07 10:21:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3c71e8f02dc3eee71c99d7c46768840f (4 x AgentTesla, 3 x Formbook)
ssdeep 12288:xHys6Cw3mEKZa8JYu2pXCeU9L3gwtQ8C/:sPNmRZHneUV3gMQp
Threatray 49 similar samples on MalwareBazaar
TLSH 28F6F125B9C0C073D03A29350470DB709A2DFA305F619CEF6759177EAF313E296299AB
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 310989 Sample: payment slip.exe Startdate: 07/11/2020 Architecture: WINDOWS Score: 72 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected AgentTesla 2->21 23 2 other signatures 2->23 6 payment slip.exe 1 2->6         started        process3 process4 8 WerFault.exe 23 9 6->8         started        11 conhost.exe 6->11         started        13 MSBuild.exe 6->13         started        file5 15 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 8->15 dropped
Threat name:
Win32.Spyware.Stelega
Status:
Malicious
First seen:
2020-11-07 00:30:20 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
832b94638ad0196de53e869de9d93e632e89f4b5115e0919f0977a10eb30e64d
MD5 hash:
5711672deb579b3a9908ad3926eef461
SHA1 hash:
a062d447ea139f90f566c25eee732011860586ac
SH256 hash:
b50c70d946c52250c8830942add18d8df9c3693e5376f6e2cb70337a67279384
MD5 hash:
bf747c17392e6e12037403a13d6ce281
SHA1 hash:
4287dff855807178c33ac6deeb0b38a67aafaba9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 832b94638ad0196de53e869de9d93e632e89f4b5115e0919f0977a10eb30e64d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments