MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c5ed24617a8781237722d5368eadc312568dc08fd92c666a4441e6d4a714dea3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | c5ed24617a8781237722d5368eadc312568dc08fd92c666a4441e6d4a714dea3 |
|---|---|
| SHA3-384 hash: | d5b9f097c5e9afad7552c34011f9289ef51bcaea69913a2ed924237a005e16747b8e9444e9be5f46a5bbc11b63f93b60 |
| SHA1 hash: | 54b3dead533d8a4b7d9a12f21053ddfb1dbcf2c8 |
| MD5 hash: | 289cdcfb4f1c40ddfa19ff63a0086ca9 |
| humanhash: | delta-fillet-july-wolfram |
| File name: | 6117bfd2adcabdfe879b85d9fa0855fc.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 300'032 bytes |
| First seen: | 2020-04-05 19:35:11 UTC |
| Last seen: | 2020-04-08 14:20:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:WdrBftVXRb4JLT1bcArpAYWqL50xo3glRqVdyfGyb:IxRb4JLpbnrERRE |
| Threatray | 10'588 similar samples on MalwareBazaar |
| TLSH | 115419BC2B88B902F63D0D3389D1266162F195834D22CB0F6EC45BFD7B567C9294A3A5 |
| Reporter | |
| Tags: | AgentTesla exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:https://drive.google.com/uc?export=download&id=15vd8iYwNX_Ax7PYjYl1aM-OTiPjNBVqx
Intelligence
File Origin
# of uploads :
3
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Autorun
Status:
Malicious
First seen:
2020-04-05 20:35:50 UTC
File Type:
PE (.Net Exe)
AV detection:
23 of 30 (76.67%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 10'578 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
20d97b53712cacad99d47d0385cc1fe0355887041fe0f274b90432067ffb782a
Dropped by
MD5 6117bfd2adcabdfe879b85d9fa0855fc
Dropped by
MD5 9cd5ff16110ff980062e68f671273772
Dropped by
GuLoader
Dropped by
SHA256 20d97b53712cacad99d47d0385cc1fe0355887041fe0f274b90432067ffb782a
Dropped by
SHA256 2f23bc41433bc7b5e27b57d0e5e5ef4fc3ed9f9e0bcbd56cac3841fddd410774
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.