MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b464e356f98cb514fa9b6131c3af6b27099dddaf1b6ca50ae7bae783beb02af0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 2 File information 4 Yara 3 Comments

SHA256 hash: b464e356f98cb514fa9b6131c3af6b27099dddaf1b6ca50ae7bae783beb02af0
SHA3-384 hash: 39cb11a1934d715f5b84260ff61120bc609255b77dae69dc9bf5bd7a4abd988156e2fae300d740ff3354c5cd87ab8339
SHA1 hash: 8cd137ee856179155f99996684fd772124128a87
MD5 hash: 8cb3c6e7b7287e1f31065550d42af32d
humanhash: pluto-bakerloo-emma-victor
File name:SHIPMENT RECEIPT.exe
Download: download sample
Signature AgentTesla
File size:923'440 bytes
First seen:2020-06-30 08:51:10 UTC
Last seen:2020-06-30 09:59:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:gV2PlkjojXEh0zXnVO/AywT1GMfRbXW13HQ3ky6nnjqKoeYSnjoX:njUqzXV+wJnpb96nnjqKoeRo
TLSH 6D156B1BB944D54DCA1694B2D09BC9B033619CEA9326860F7ACA3F577CF53431C2B62E
Reporter @abuse_ch
Tags:AgentTesla DHL exe


Twitter
@abuse_ch
Malspam distributing AgentTesla:

HELO: dhlonline.gleeze.com
Sending IP: 2.56.8.129
From: DHL EXPRESS <export@dhlexpress.top>
Subject: Shipment Arrival Notification
Attachment: SHIPMENT RECEIPT.IMG (contains "SHIPMENT RECEIPT.exe")

AgentTesla SMTP exfil server:
smtp.yandex.com:587

Intelligence


Mail intelligence
Trap location Impact
Global Low
# of uploads 2
# of downloads 31
Origin country FR FR
CAPE Sandbox Detection:AgentTeslaV2
Link: https://www.capesandbox.com/analysis/17012/
ClamAV SecuriteInfo.com.MSIL.Injector.UWI.18013.UNOFFICIAL
CERT.PL MWDB Detection:agenttesla
Link: https://mwdb.cert.pl/sample/b464e356f98cb514fa9b6131c3af6b27099dddaf1b6ca50ae7bae783beb02af0/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Injector
First seen:2020-06-30 08:53:06 UTC
AV detection:23 of 31 (74.19%)
Threat level:   2/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:agenttesla
Link: https://tria.ge/reports/200630-3qpy85c382/
Tags:spyware keylogger trojan stealer family:agenttesla
VirusTotal:Virustotal results 21.92%

Yara Signatures


Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:win_agent_tesla_w1
Author:govcert_ch
Description:Detect Agent Tesla based on common .NET code sequences

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe b464e356f98cb514fa9b6131c3af6b27099dddaf1b6ca50ae7bae783beb02af0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments