MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3820448fb9d548a6e581c0fbf4bb3716d2cb945ba790a8fab3fd02ac3ec844b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c3820448fb9d548a6e581c0fbf4bb3716d2cb945ba790a8fab3fd02ac3ec844b
SHA3-384 hash: 6324be95468ab2735850611469acbdf46884aba4dce4493b4685533e8959616808a53741ae052a1fde4226dcf355d21d
SHA1 hash: 2ba7ebddebd2b48a6bef8bec1eb1d64596077cdd
MD5 hash: 8d99214e831842025f9a3101cde59456
humanhash: quebec-beer-xray-missouri
File name:PHOTOS_O.EXE
Download: download sample
Signature AgentTesla
File size:1'474'560 bytes
First seen:2020-04-21 12:55:20 UTC
Last seen:2020-04-21 14:06:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash db480ea6abb006121408eece2d202152 (1 x AgentTesla)
ssdeep 12288:6Nqd0SEhgDnzhuHaM19VqAjk5so88OnNC+1c3YGpTUkTd3OXCBQ9co6q0lpcPPib:Td6gD83OdgAPTpV
Threatray 11'081 similar samples on MalwareBazaar
TLSH FF658FE2DE1B926AF74B257DBB5C72D0B89CB7011F7F0C1A38CCE51C56679A1088E960
Reporter abuse_ch
Tags:AgenTesla AgentTesla COVID-19 exe


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: mail.trigunamandala.co.id
Sending IP: 103.227.147.230
From: "Shahzad Akbar" <anin@trigunamandala.co.id>
Subject: Photos of our staff with the COVID-19 viral infection
Attachment: Photos of our staff with the COVID-19 viral infection.img (contains "PHOTOS_O.EXE")

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Dropback
Status:
Malicious
First seen:
2020-04-21 01:14:00 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe c3820448fb9d548a6e581c0fbf4bb3716d2cb945ba790a8fab3fd02ac3ec844b

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::IsValidSecurityDescriptor
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipDeleteGraphics
gdiplus.dll::GdipAlloc
gdiplus.dll::GdipCreateFromHDC
MULTIMEDIA_APICan Play MultimediaMSVFW32.dll::ICCompressorChoose
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::PeekMessageA
USER32.dll::CreateWindowExA

Comments