MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c33fa2c2e322a471fd53eeb35f72960019fe1e47f34060a5cb1600a6ce20752a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c33fa2c2e322a471fd53eeb35f72960019fe1e47f34060a5cb1600a6ce20752a
SHA3-384 hash: c3ee95a0e6a8df49d877c1f52584172aa312734a3102327c3d7c7fb4a16ac2d0a48a840e5dd2198c88ca44199c1c0a12
SHA1 hash: 098e06e79640a5f76645e240c88f075464004162
MD5 hash: 6a9b756ec8bc0c666fe77bc2a92a3fed
humanhash: mexico-fix-six-skylark
File name:6a9b756ec8bc0c666fe77bc2a92a3fed.exe
Download: download sample
Signature AgentTesla
File size:449'024 bytes
First seen:2021-03-11 07:37:16 UTC
Last seen:2021-03-11 09:47:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 6144:t+OWF7hQmhHIjGEIMzx0qwPrecdWS2pZR5EndpcjtPF2ldhHt9mZp:t+OWF7hQmhH0GEIGx1arZoBupcBNYnm
Threatray 41 similar samples on MalwareBazaar
TLSH 09A49D100A7C5556F6428F37303F3A346F962FD9190AEC01699EB0ABDAFB33811ED695
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6a9b756ec8bc0c666fe77bc2a92a3fed.exe
Verdict:
Malicious activity
Analysis date:
2021-03-11 07:39:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Creating a window
Enabling the 'hidden' option for analyzed file
Creating a file in the %temp% directory
Moving a recently created file
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa.evad
Score:
72 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Beds Obfuscator
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Infostealer.Stelega
Status:
Malicious
First seen:
2021-03-11 01:00:46 UTC
AV detection:
11 of 27 (40.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Beds Protector Packer
Unpacked files
SH256 hash:
97024f17003dd3d31dab64c4d1b8251e50d428644eb59ed3692ad79ce42019cf
MD5 hash:
8cd28be4bd9a1404c6d3600db32b3ed1
SHA1 hash:
fb90b0ca51118e771390d58b19d0a404ee14cfbc
SH256 hash:
5906131cd49d5a31a1a7822ea84b8a663cad2b0020e48548b5d61821a840bb37
MD5 hash:
66a3e859b4c5a574c5007eb78f8adc63
SHA1 hash:
50191feb0e2208f3495d0198b499e6e919cfb7e1
SH256 hash:
e4312af1a4743598fcac13107e8c234a31e48eb205e4a6ad1623b77f2f984171
MD5 hash:
b383b32618d78ff5c451e9dd526f5c33
SHA1 hash:
281d98b2524d65cb14c6a48380e7e26aae79f3c2
SH256 hash:
c33fa2c2e322a471fd53eeb35f72960019fe1e47f34060a5cb1600a6ce20752a
MD5 hash:
6a9b756ec8bc0c666fe77bc2a92a3fed
SHA1 hash:
098e06e79640a5f76645e240c88f075464004162
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe c33fa2c2e322a471fd53eeb35f72960019fe1e47f34060a5cb1600a6ce20752a

(this sample)

  
Delivery method
Distributed via web download

Comments