MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c4c846dfa5755910d28a93a91ecfea8dcde72860fea03da1a47adf9ce65470a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: c4c846dfa5755910d28a93a91ecfea8dcde72860fea03da1a47adf9ce65470a1
SHA3-384 hash: 43c4ea1fa24dcaa351a9250d4d9b9907ff0daa8ba4eba61baf4d7a582d71fd81ad9949cae41c4b6cae9b82cf557c0025
SHA1 hash: a2545f5c8af6da03288dd0b24ddc72fbb35cad2d
MD5 hash: b438cf5e9aa34e6cfa3d8d27d2649326
humanhash: aspen-steak-nuts-zebra
File name:nnLfl
Download: download sample
Signature AgentTesla
File size:128'512 bytes
First seen:2020-07-13 05:28:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 1536:4iNarDCgADwBHDMWnByYgQw+bVK5sFwhS5MpOFMJQuIxIz1hVGAF4qV6Bt6q7:4caOKDMGyYDb7wheHCaIz1hVGFwYYg
Threatray 10'650 similar samples on MalwareBazaar
TLSH B2C3757703A45B1EE1BE937CE9D254308BF9AC2DDF02E7413E49138647E2B249E19B46
Reporter JAMESWT_WT
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Threat name:
ByteCode-MSIL.Trojan.Scrami
Status:
Malicious
First seen:
2020-07-11 18:40:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
33 of 48 (68.75%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
persistence spyware keylogger trojan stealer family:agenttesla
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run entry to start application
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
Blacklisted process makes network request
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe c4c846dfa5755910d28a93a91ecfea8dcde72860fea03da1a47adf9ce65470a1

(this sample)

  
Delivery method
Distributed via web download

Comments