MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a
SHA3-384 hash: 58b686ee24d44668e9a6f324fe3673a5957135f027ea15046e6713a36afb720bdc7e3f8d2d429498277f95c0b438b025
SHA1 hash: 8537083071d732ab2f0ebcd85d3c9f3e5e960fd2
MD5 hash: 9c4a181aa969c73e4f680031b2790a06
humanhash: hydrogen-winter-floor-mobile
File name:Plaston New PO 067476.7z
Download: download sample
Signature AgentTesla
File size:673'437 bytes
First seen:2024-09-10 10:10:07 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:NhAcV6Y8w8h1/95Y9b+esq/4MhN/u5fbKVmfRJuhOKTjCUoPTZ7V:NucV6Y8wyUK5q/L3m5WmfvuOKTjCUOV5
TLSH T163E4339A1DE50177588AABF510E1E6FFB20E5CF162A727E83F1CD9E57404E1680E39C8
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Magika sevenzip
Reporter cocaman
Tags:7z


Avatar
cocaman
Malicious email (T1566.001)
From: "Shen Ethan <ethan.shen@plaston.cn>" (likely spoofed)
Received: "from plaston.cn (216-131-73-250.iad.as62651.net [216.131.73.250]) "
Date: "10 Sep 2024 03:09:14 -0700"
Subject: "=?UTF-8?B?6K6i5Y2VMDY3NDc2?="
Attachment: "Plaston New PO 067476.7z"

Intelligence


File Origin
# of uploads :
1
# of downloads :
272
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Plaston New PO 067476.exe
File size:1'017'856 bytes
SHA256 hash: b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346
MD5 hash: d30bb9df615a8d1661f843d426ff40eb
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Infostealer Network Static Stealth Heur
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.SuspMsilInArcEmail
Status:
Malicious
First seen:
2024-09-10 07:20:38 UTC
File Type:
Binary (Archive)
Extracted files:
43
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla credential_access discovery execution keylogger spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Credentials from Password Stores: Credentials from Web Browsers
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments