MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bfe907c9b06cbec8324b3a0b0a2809b380a5b04907affec800dd9fb95d2f616d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | bfe907c9b06cbec8324b3a0b0a2809b380a5b04907affec800dd9fb95d2f616d |
|---|---|
| SHA3-384 hash: | 0efd85af38c9fc37d0b10339ce6b1ae17a8dabcbe3f8452c7604605ea24a9ecf0aa79844455b12e2d2cad3bfe16e7107 |
| SHA1 hash: | ede5591273e2c1ac8b1f81791bedebc321f4a63a |
| MD5 hash: | 335d26a894360b0aa41d99285d1346f3 |
| humanhash: | delta-spaghetti-fanta-maryland |
| File name: | DHL Express Courier Pickup Confirmation CBJ210623122097.ace |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 581'727 bytes |
| First seen: | 2021-07-12 11:00:32 UTC |
| Last seen: | 2021-07-13 05:00:15 UTC |
| File type: | ace |
| MIME type: | application/octet-stream |
| ssdeep | 12288:1EkcfrJKObyFV46MhL/LJre2De2kk8XHvN/vL+CmPQnPnbTp:evooyFV4dJrdyHkAHNPa+F |
| TLSH | T15AC433DB943C7A9ACBCDF0078EEC7AB0581A8B4477F411D45D2AB1603EC1ACD8567A87 |
| Reporter | |
| Tags: | ace AgentTesla DHL |
cocaman
Malicious email (T1566.001)From: "dhlSender@dhl.com" (likely spoofed)
Received: "from ru02.random.com (unknown [109.237.103.43]) "
Date: "12 Jul 2021 10:06:40 -0700"
Subject: "RE: DHL EXPRESS SHIPMENT: urs.lustenberger@lgpartner.ch / INVL#06232021"
Attachment: "DHL Express Courier Pickup Confirmation CBJ210623122097.ace"
Intelligence
File Origin
# of uploads :
2
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-12 10:30:31 UTC
File Type:
Binary (Archive)
Extracted files:
18
AV detection:
11 of 29 (37.93%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.