MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 949232bbf3de3c8ae172293cf4e051910570ce0af78f7ca3cd19558601cae34b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 7
| SHA256 hash: | 949232bbf3de3c8ae172293cf4e051910570ce0af78f7ca3cd19558601cae34b |
|---|---|
| SHA3-384 hash: | 5eb0ba52b90a619def802ede175fa54128e2e1cdd5c170f666453dd40d058d25d9848fe24c59246d8c5d58914c3352fc |
| SHA1 hash: | bd3ffe5c2f66cd4b378cc0b8a9af2bf7ab073fe7 |
| MD5 hash: | 09352e6ffe70e5dd0285aa4e7a45b1af |
| humanhash: | berlin-gee-black-indigo |
| File name: | DOC131020-13102020161809.pdf |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 485'888 bytes |
| First seen: | 2020-10-15 12:56:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger) |
| ssdeep | 6144:tr0Dx9dBuk7Rxpq8BSvMPIeQFIna2xYXgo8IP5yxh8QO/2eX/GV:tgD/3Jrpq+AKa2BIzP//X/GV |
| TLSH | 51A4BFB27D52587ECA6F077550AA85C1FAB616C73F608B0D71AF430C0E01A2BEB5725B |
| Reporter | |
| Tags: | AgentTesla pdf |
Intelligence
File Origin
# of uploads :
1
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Detection:
AgentTeslaV3
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Sending a UDP request
Creating a window
Running batch commands
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Creates an autostart registry key pointing to binary in C:\Windows
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Add file from suspicious location to autostart registry
Tries to detect virtualization through RDTSC time measurements
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-15 09:41:16 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
949232bbf3de3c8ae172293cf4e051910570ce0af78f7ca3cd19558601cae34b
MD5 hash:
09352e6ffe70e5dd0285aa4e7a45b1af
SHA1 hash:
bd3ffe5c2f66cd4b378cc0b8a9af2bf7ab073fe7
SH256 hash:
19d9922060be89a70b76e5c0056e751f1baa5d41819235c92cf4f5d7668e1267
MD5 hash:
811864a0b06c529af894a7fec6ddbf47
SHA1 hash:
d35b82933eb06a6ec60e8cbbdb65eb6cdcaeb6d2
SH256 hash:
615969ada6ce23fb842b1d84c1c61c283746284913ec93dcb69ad87a262f4fb0
MD5 hash:
ae0e5dd06c7b9b00ccab5ea3c38ecd17
SHA1 hash:
f04a41f072479daab85622d236a823b048ba7d55
SH256 hash:
6d29f8489464ba328fba609fe40684964660de231003def0df826f3396deecca
MD5 hash:
7ac38f8458cd4965cb3ec5562b553671
SHA1 hash:
c6d42a009ce711be7fc9e9e925d66859fa5c4626
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.