MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c794e52e53a25235b2c3ecb1db63f5d8fc690ee889e32f5df4ad351fb24bcc34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 12
| SHA256 hash: | c794e52e53a25235b2c3ecb1db63f5d8fc690ee889e32f5df4ad351fb24bcc34 |
|---|---|
| SHA3-384 hash: | 737efb74aaee7796a3930588703a6a823fe4a1cf55454e7bf08f94a04df8cf631ef879abab3c7c283813b06ca03c1692 |
| SHA1 hash: | bb514b7fd44138b020c210f7e810a574c8140175 |
| MD5 hash: | 6013faef1e191eb0b9419f1c58b83de2 |
| humanhash: | autumn-river-johnny-king |
| File name: | 70%.Advance.payment.012,022020.pdf.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 660'480 bytes |
| First seen: | 2020-12-03 17:44:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:1lX8GOnvTvEoxH08xbO0AsHDiSiD7QGDzUpZ2HoR8nCfI:oGOv7EoV0CmsjjubHhx |
| Threatray | 10'801 similar samples on MalwareBazaar |
| TLSH | 95E4F13123697F96DE794BF4A16134441FB4B427A636F28DACC111DE21ABB058FA0DB3 |
| Reporter | |
| Tags: | AgentTesla exe |
abuse_ch
Malspam distributing AgentTesla:HELO: supplyafrica.co.tz
Sending IP: 160.20.147.41
From: Account Payment Department<sales@supplyafrica.co.tz>
Reply-To: Accountant<officeme47@yandex.com>
Subject: RE: Advance Payment Slip For December 2020
Attachment: 70%.Advance.payment.012,022020.pdf.7z (contains "70%.Advance.payment.012,022020.pdf.exe")
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_extracted_bin |
|---|---|
| Author: | James_inthe_box |
| Description: | AgentTesla extracted |
| Rule name: | AgentTesla_mod_tough_bin |
|---|---|
| Author: | James_inthe_box |
| Reference: | https://app.any.run/tasks/3b5d409c-978b-4a95-a5f1-399f0216873d/ |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | agent_tesla_2019 |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | CAP_HookExKeylogger |
|---|---|
| Author: | Brian C. Bell -- @biebsmalwareguy |
| Reference: | https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar |
| Rule name: | win_agent_tesla_v1 |
|---|---|
| Author: | Johannes Bader @viql |
| Description: | detects Agent Tesla |
| Rule name: | win_agent_tesla_w1 |
|---|---|
| Author: | govcert_ch |
| Description: | Detect Agent Tesla based on common .NET code sequences |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
f45f1b607976ebf47b4c37ce9b29fbc8
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.