MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a745b4a8dbdad5c84183ce33793aac75423bdb99fd3a3fca646fbeb66e1059f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 14
| SHA256 hash: | a745b4a8dbdad5c84183ce33793aac75423bdb99fd3a3fca646fbeb66e1059f2 |
|---|---|
| SHA3-384 hash: | e7b488edb646f59fc5d88f4f4490e54ea84a80302f5f01ba0668ee360301ff92674f9e400e49530af8902158027b3f8f |
| SHA1 hash: | f65c44d444d07369e6ce3d071ca10250d1a6bd09 |
| MD5 hash: | f639ba06d07ccac3de8ef537e1de39fb |
| humanhash: | twelve-orange-arkansas-summer |
| File name: | rNuevaOrdendeCo.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'011'720 bytes |
| First seen: | 2024-05-08 17:57:27 UTC |
| Last seen: | 2024-05-17 15:16:06 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 24576:JIuCwxp5Am2H95onzQCUCe35+kk0SqMwh/x:Gpw9Am2dOQCUC++krx |
| TLSH | T14B25D001064C867AFBAF43B4D096185BD7F9E242B24BFF985CC695EA3887FD1E206057 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | e08cc6c6c6c68ce0 (6 x AgentTesla, 1 x Loki, 1 x RemcosRAT) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
BRVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.