MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 955799ac14b2af1d9b8caee1acbc5c9602872bb5143449e3cb807405f77ce835. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 955799ac14b2af1d9b8caee1acbc5c9602872bb5143449e3cb807405f77ce835
SHA3-384 hash: d80f7290d4a4b261cc44767086fd8651470cbf48ec529f1344a07cdc293e6474822a9bfd240847836b4770bd35469fcb
SHA1 hash: 00719875c061d7d9a5126a6aa127b4d3a7a18032
MD5 hash: f77fb9696ca8e53fb087c7db3a2f1e6f
humanhash: twenty-mango-monkey-juliet
File name:Request For Quotation.zip
Download: download sample
Signature AgentTesla
File size:971'181 bytes
First seen:2021-08-02 06:44:29 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:hyf4cK/bya41499QECxApHS2YLV+CVXlL4+3QAuLTOMvrIw4Pe2:hyf4BbP41k99VxYxVVVdVupvrK22
TLSH T14E253346F5886DCCEA2C7DB4B98520F161BB1019803C896787A47521EBB3FF99DC1D27
Reporter cocaman
Tags:AgentTesla DHL zip


Avatar
cocaman
Malicious email (T1566.001)
From: "DHL EXPRESS<jerin.benjamin@dhl.com>" (likely spoofed)
Received: "from dhl.com (unknown [77.247.110.225]) "
Date: "2 Aug 2021 07:35:43 +0200"
Subject: "Consignment-Notification: You have a parcel"
Attachment: "Request For Quotation.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
309
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2021-08-02 01:01:35 UTC
File Type:
Binary (Archive)
Extracted files:
135
AV detection:
7 of 46 (15.22%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 955799ac14b2af1d9b8caee1acbc5c9602872bb5143449e3cb807405f77ce835

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments