MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9940dd5ca9e502ac7e320c970d86e80491a8d6aa1ab5c649b10ae177042c4757. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9940dd5ca9e502ac7e320c970d86e80491a8d6aa1ab5c649b10ae177042c4757
SHA3-384 hash: 2f56f6a57815803a111e7aeec19a1c92862c1f7bebca83171c65d9f3a82acee3268c7a377a9dac40b4d58034e0fd2fca
SHA1 hash: 194bfee9ef768bdb123baf1af16faf4412bc4278
MD5 hash: 81a9c901c359528acc4d27ce464988de
humanhash: robert-pizza-ink-beryllium
File name:HL-883525800 DOCAU BC ORIGINAL.zip
Download: download sample
Signature AgentTesla
File size:1'039'151 bytes
First seen:2021-06-25 06:14:59 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:wlL67J6EuLeLTIYyO50390/C6uF6xuC2b83ZJnHhJHbcVzE8dqsR:wA96EuaHIYy089qCgxO83ZxXMwOqi
TLSH 0D253306F581B2FDDC09FA9B0D003AAEE4C68BF279665C4EAC28BC11323CB157D75916
Reporter cocaman
Tags:AgentTesla DHL zip


Avatar
cocaman
Malicious email (T1566.001)
From: "dhlSender<dhlSender@dhl.com>" (likely spoofed)
Received: "from bizcloud-server.guanqtai.com (unknown [143.110.251.68]) "
Date: "24 Jun 2021 11:52:11 +0200"
Subject: "Your DHL pickup has been scheduled_CBJ210510109009 "
Attachment: "HL-883525800 DOCAU BC ORIGINAL.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Infostealer.DarkStealer
Status:
Malicious
First seen:
2021-06-24 22:11:52 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 9940dd5ca9e502ac7e320c970d86e80491a8d6aa1ab5c649b10ae177042c4757

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments