MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c8a4bb98cbc68663e4a07d58c393c00797365a2f3305d039809554a72e2bd01e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | c8a4bb98cbc68663e4a07d58c393c00797365a2f3305d039809554a72e2bd01e |
|---|---|
| SHA3-384 hash: | fd10cd460779e3ec7e97e0466e844051f43a7bc4fbfaa17df3d9b0179e77557a683aeeb87326411886d13f48d98aba74 |
| SHA1 hash: | 864616830e502ed7c401f39d98ee634d17523039 |
| MD5 hash: | c957a5f737c9d386b24b368b43ef8a5e |
| humanhash: | oregon-winner-asparagus-crazy |
| File name: | vaccine release for Corona-virus(COVID-19)_pdf.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 102'400 bytes |
| First seen: | 2020-04-03 17:22:47 UTC |
| Last seen: | 2020-04-03 18:01:28 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7e184e61f4bf80019db90cd92d165430 (1 x AgentTesla) |
| ssdeep | 768:o+RIDPnJeEJvX4Mmg9Ke4pGTbEi+d+5jcmaWpsUH1YBFYK:BeDheEJ/4negGHEi2OjPnH1YB/ |
| Threatray | 744 similar samples on MalwareBazaar |
| TLSH | D8A3E666BA10FE50D4081EB2DD3A97EC4134BC71AD016A07BAC83F6F3D71581BA52B67 |
| Reporter | |
| Tags: | AgentTesla COVID-19 exe GuLoader |
abuse_ch
COVID-19 themed malspam distributing GuLoader->AgentTesla:HELO: server.kto.org.tr
Sending IP: 185.135.222.3
From: Dr. Kim Jung <info@hardworkingincs.pro>
Subject: Latest vaccine release for Corona-virus(COVID-19)
Attachment: vaccine release for Corona-virusCOVID-19_pdf.rar (contains "vaccine release for Corona-virus(COVID-19)_pdf.exe")
GuLoader payload URL (AgentTesla):
https://drive.google.com/uc?export=download&id=1Trzyb2eW-3WLdj4BQQq_kissPU1THWy5
AgentTesla SMTP exfil server:
us2.smtp.mailhostbox.com:587 (208.91.198.143)
Intelligence
File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-04 01:07:36 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 734 additional samples on MalwareBazaar
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| VB_API | Legacy Visual Basic API used | MSVBVM60.DLL::EVENT_SINK_AddRef MSVBVM60.DLL::__vbaFileOpen MSVBVM60.DLL::__vbaErrorOverflow |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.