MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bfe907c9b06cbec8324b3a0b0a2809b380a5b04907affec800dd9fb95d2f616d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: bfe907c9b06cbec8324b3a0b0a2809b380a5b04907affec800dd9fb95d2f616d
SHA3-384 hash: 0efd85af38c9fc37d0b10339ce6b1ae17a8dabcbe3f8452c7604605ea24a9ecf0aa79844455b12e2d2cad3bfe16e7107
SHA1 hash: ede5591273e2c1ac8b1f81791bedebc321f4a63a
MD5 hash: 335d26a894360b0aa41d99285d1346f3
humanhash: delta-spaghetti-fanta-maryland
File name:DHL Express Courier Pickup Confirmation CBJ210623122097.ace
Download: download sample
Signature AgentTesla
File size:581'727 bytes
First seen:2021-07-12 11:00:32 UTC
Last seen:2021-07-13 05:00:15 UTC
File type: ace
MIME type:application/octet-stream
ssdeep 12288:1EkcfrJKObyFV46MhL/LJre2De2kk8XHvN/vL+CmPQnPnbTp:evooyFV4dJrdyHkAHNPa+F
TLSH T15AC433DB943C7A9ACBCDF0078EEC7AB0581A8B4477F411D45D2AB1603EC1ACD8567A87
Reporter cocaman
Tags:ace AgentTesla DHL


Avatar
cocaman
Malicious email (T1566.001)
From: "dhlSender@dhl.com" (likely spoofed)
Received: "from ru02.random.com (unknown [109.237.103.43]) "
Date: "12 Jul 2021 10:06:40 -0700"
Subject: "RE: DHL EXPRESS SHIPMENT: urs.lustenberger@lgpartner.ch / INVL#06232021"
Attachment: "DHL Express Courier Pickup Confirmation CBJ210623122097.ace"

Intelligence


File Origin
# of uploads :
2
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-12 10:30:31 UTC
File Type:
Binary (Archive)
Extracted files:
18
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

ace bfe907c9b06cbec8324b3a0b0a2809b380a5b04907affec800dd9fb95d2f616d

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments