MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b052d189fbba69117efc6e10e1cada3faee844cb59b5f0d1482734976c72bd58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 8
| SHA256 hash: | b052d189fbba69117efc6e10e1cada3faee844cb59b5f0d1482734976c72bd58 |
|---|---|
| SHA3-384 hash: | 1cc3f0a1d7f60a995682e1a62eefe587880f11e472f6da1e1472dddc1928fe3c795a159b6556f54ee50cdb018b5ced7a |
| SHA1 hash: | 2d103b260d9e72844e590dc46b72f33a4e2fe178 |
| MD5 hash: | b52112bdfc9dddbdc6fbb9d736f44f5a |
| humanhash: | march-delta-alpha-earth |
| File name: | PURCHASE ORDER.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'577'984 bytes |
| First seen: | 2020-10-05 14:32:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 49152:Ph+ZkldoPK8YaHWgb1Q313x66bxkg6Me:Y2cPK8cgZQlpkg |
| Threatray | 765 similar samples on MalwareBazaar |
| TLSH | C775DF0273D1D036FFABA2739B6AF64556BC7C250123852F13981DB9B9701B2273E663 |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
AutoIt script contains suspicious strings
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-04 21:41:26 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 755 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
keylogger stealer spyware trojan family:agenttesla
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
0897d0954dded59cbe044276d8a380bcd3e5d2fdc86bddb01d3dfaac14050737
MD5 hash:
b23f431cfbca2c6409e18459da7d2fa0
SHA1 hash:
a7b54495e410718a5dbb77a2b179fbecf016a7e9
Detections:
win_agent_tesla_w1
Parent samples :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 hash:
b052d189fbba69117efc6e10e1cada3faee844cb59b5f0d1482734976c72bd58
MD5 hash:
b52112bdfc9dddbdc6fbb9d736f44f5a
SHA1 hash:
2d103b260d9e72844e590dc46b72f33a4e2fe178
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Nanocore
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.