MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ac5d5c01ca1db919755e4c303e6d0f094c5c729a830f99f8813b373588dc6c27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | ac5d5c01ca1db919755e4c303e6d0f094c5c729a830f99f8813b373588dc6c27 |
|---|---|
| SHA3-384 hash: | 34eb733f7cda22bb45164a8af44fe59cd0b90fdf9762915d253a4667bae477fda5dfdf138bac0d6c181570c05711047e |
| SHA1 hash: | f2ece557a643502a5581aec4dd73c290f2caf0b1 |
| MD5 hash: | df183d9c85fb2e2c30dcf9f828f74d2d |
| humanhash: | tennessee-alanine-beryllium-oregon |
| File name: | CLOSE DOWN ORDER FROM CDC DATED 4.1.2020.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'632'768 bytes |
| First seen: | 2020-04-07 07:02:45 UTC |
| Last seen: | 2020-04-07 07:42:23 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 60a7513cb930ce941dd9ccd67428c4e1 (1 x AgentTesla) |
| ssdeep | 24576:P93JCvyd4xE6YY/opp7WtWwrdofIZZSkKJm+gDRnTTlxe+:/zdWn++pofIZsgDBTX1 |
| Threatray | 219 similar samples on MalwareBazaar |
| TLSH | 6975D02FF65892E3ED1610310AC6CFF9A63A7866332183DBB545AB1544ECFD0397934A |
| Reporter | |
| Tags: | AgentTesla COVID-19 exe |
abuse_ch
COVID-19 themed malspam distributing AgentTesla:HELO: 162-241-214-72.unifiedlayer.com
Sending IP: 162.241.214.72
From: HR Department <HR@victim-domain>
Subject: (UPDATE COVID-19) CLOSE DOWN ORDER FROM CDC DATED 4.1.2020
Attachment: CLOSE DOWN ORDER FROM CDC DATED 4.1.2020.img (contains "CLOSE DOWN ORDER FROM CDC DATED 4.1.2020.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-04-07 07:13:11 UTC
File Type:
PE (Exe)
Extracted files:
73
AV detection:
23 of 31 (74.19%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
unknown
Similar samples:
+ 209 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance |
| MULTIMEDIA_API | Can Play Multimedia | AVIFIL32.dll::AVIMakeCompressedStream AVICAP32.dll::capGetDriverDescriptionA WINMM.dll::joyGetPosEx WINMM.dll::timeBeginPeriod WINMM.dll::timeEndPeriod WINMM.dll::timeGetTime |
| RPC_API | Can Execute Remote Procedures | RPCRT4.dll::RpcBindingInqOption |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AdjustTokenPrivileges |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::OpenProcessToken KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetSystemInfo KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::WriteConsoleA KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleOutputCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateFileA KERNEL32.dll::CreateFileMappingA SHLWAPI.dll::PathRemoveFileSpecW KERNEL32.dll::GetWindowsDirectoryW |
| WIN_BASE_USER_API | Retrieves Account Information | ADVAPI32.dll::LookupPrivilegeValueA |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegOpenKeyA ADVAPI32.dll::RegQueryValueExA |
| WIN_USER_API | Performs GUI Actions | USER32.dll::FindWindowA USER32.dll::PeekMessageA USER32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.