MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9dad5664f3e53495461efac0267783397ec03a94ba182d15679608531435f565. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: 9dad5664f3e53495461efac0267783397ec03a94ba182d15679608531435f565
SHA3-384 hash: 48d0e00dcf310101bbe664725b640745a0d1309703308a4352aca199bfeb35cbd15b7831d3771d6e45e1aa35117a6547
SHA1 hash: 98ba9d879047ef97fe6795ae38fb14f9ca854b8c
MD5 hash: 40e125942c4785ea1108bc6f01ef3f4e
humanhash: quebec-michigan-mike-bulldog
File name:invoice.html
Download: download sample
Signature AgentTesla
File size:901'199 bytes
First seen:2024-04-17 10:40:59 UTC
Last seen:Never
File type: html
MIME type:text/html
ssdeep 12288:PB10t1HgpOZaaIlW0VogJHwHLvVDuV//0RIxLo4UWoVoRE9jbqo9RdlV3x5kcgya:7qaog9KLvdUn0KpoJWvREpZgn0CCk
TLSH T19B15233ABF537E7A6BBA5A0031A5180C0DE4BF678654078EE7C7645066472B0CF17AF8
Reporter pr0xylife
Tags:AgentTesla html

Intelligence


File Origin
# of uploads :
1
# of downloads :
156
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
phis.evad
Score:
80 / 100
Signature
.NET source code contains potential unpacker
Detected javascript redirector / loader
HTML document with suspicious name
HTML document with suspicious title
HTML page contains base64 encoded files
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suspicious Javascript code found in HTML file
Behaviour
Behavior Graph:
Threat name:
Document-HTML.Trojan.Heracles
Status:
Malicious
First seen:
2024-04-17 08:12:00 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:html_auto_download_b64
Author:Tdawg
Description:html auto download
Rule name:HTML_Smuggling_A
Author:marcin@ulikowski.pl
Description:Generic detection for HTML smuggling (T1027.006)
Rule name:QbotStuff
Author:anonymous

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments