MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bff0771ae9dbc7078a6afdb9fd366c5f3464606897e2710f09240981fa57ff9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: bff0771ae9dbc7078a6afdb9fd366c5f3464606897e2710f09240981fa57ff9f
SHA3-384 hash: fb7331c3659c80ddc5785e98bffe94699e73e8ccd138ac9dabfb831940625d3c2c1d8947979881a2a1d37f4efe9b3fdb
SHA1 hash: 826db53d2ff01a0d467aa04e44bf2b8eb04e7ae7
MD5 hash: fd216747a17e97b2ab1f2d3de7a49202
humanhash: spaghetti-helium-georgia-item
File name:UrgentPO.exe
Download: download sample
Signature AgentTesla
File size:1'423'360 bytes
First seen:2020-06-29 22:22:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091
ssdeep 24576:htb20pkaCqT5TBWgNQ7aV32hv5vmQs03eZEvxvgxZf0Xe6A:yVg5tQ7aV32hlmSOZM850u5
TLSH 6665D01273DDC361C7B26273BA257B016EBB782506A5F56B2FD8093DFD20122521EA73
Reporter @Racco42
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
34
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
AgentTeslaV2
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-05-31 03:19:57 UTC
AV detection:
27 of 31 (87.10%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SendNotifyMessage
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe bff0771ae9dbc7078a6afdb9fd366c5f3464606897e2710f09240981fa57ff9f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments