MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c55324a3338b9bc22115173268c046b348c71864347552938edff7132830eacc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c55324a3338b9bc22115173268c046b348c71864347552938edff7132830eacc
SHA3-384 hash: 7c0467d3ce7c1def433518b5ec6452bead9554668339d5f37af69fb52f67c0f9f89c515d1f8d90b374d43fdfd154f4e4
SHA1 hash: 41bbf6808a488dff246b605f5640b403f621a147
MD5 hash: 9307f47769c237710365aaa4ca511fe7
humanhash: virginia-four-kitten-minnesota
File name:SecuriteInfo.com.Generic.mg.9307f47769c23771.3966
Download: download sample
Signature AgentTesla
File size:270'848 bytes
First seen:2020-11-05 17:41:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:KZZNGnP1PFZsrWOyVig1WFl/uRjLuAU67T/civ:8GnPvgbg1cuRjLuT67f
Threatray 40 similar samples on MalwareBazaar
TLSH A9447DB8E55A5CA1F66F4576E6D9BD9803B33293CEC76D44432CF2910AE3791BE0240E
Reporter SecuriteInfoCom
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %AppData% subdirectories
Creating a window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Azorult
Status:
Malicious
First seen:
2020-11-05 11:08:09 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
c55324a3338b9bc22115173268c046b348c71864347552938edff7132830eacc
MD5 hash:
9307f47769c237710365aaa4ca511fe7
SHA1 hash:
41bbf6808a488dff246b605f5640b403f621a147
SH256 hash:
2d9a0cda6cd82a74dd42c6448440d9355558da95999c3b4a37a9a97ffdb59e43
MD5 hash:
a5b8c200c77ba0eeb5749ac2f1fb5f0f
SHA1 hash:
2b7c7ca0e39c98b72b994699a6b1bc27f53de784
SH256 hash:
8c2d84a9b55c01364552e49c0dc1c71dbb2740968e214efffae3cf27fe950c6b
MD5 hash:
473a3e6d860e0f9eb0691c8b58567bb2
SHA1 hash:
d8f9fb3cd0c257c3dfad2d98cb13cb3d6fd5185a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe c55324a3338b9bc22115173268c046b348c71864347552938edff7132830eacc

(this sample)

  
Delivery method
Distributed via web download

Comments