MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8a4bb98cbc68663e4a07d58c393c00797365a2f3305d039809554a72e2bd01e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c8a4bb98cbc68663e4a07d58c393c00797365a2f3305d039809554a72e2bd01e
SHA3-384 hash: fd10cd460779e3ec7e97e0466e844051f43a7bc4fbfaa17df3d9b0179e77557a683aeeb87326411886d13f48d98aba74
SHA1 hash: 864616830e502ed7c401f39d98ee634d17523039
MD5 hash: c957a5f737c9d386b24b368b43ef8a5e
humanhash: oregon-winner-asparagus-crazy
File name:vaccine release for Corona-virus(COVID-19)_pdf.exe
Download: download sample
Signature AgentTesla
File size:102'400 bytes
First seen:2020-04-03 17:22:47 UTC
Last seen:2020-04-03 18:01:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e184e61f4bf80019db90cd92d165430 (1 x AgentTesla)
ssdeep 768:o+RIDPnJeEJvX4Mmg9Ke4pGTbEi+d+5jcmaWpsUH1YBFYK:BeDheEJ/4negGHEi2OjPnH1YB/
Threatray 744 similar samples on MalwareBazaar
TLSH D8A3E666BA10FE50D4081EB2DD3A97EC4134BC71AD016A07BAC83F6F3D71581BA52B67
Reporter abuse_ch
Tags:AgentTesla COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader->AgentTesla:

HELO: server.kto.org.tr
Sending IP: 185.135.222.3
From: Dr. Kim Jung <info@hardworkingincs.pro>
Subject: Latest vaccine release for Corona-virus(COVID-19)
Attachment: vaccine release for Corona-virusCOVID-19_pdf.rar (contains "vaccine release for Corona-virus(COVID-19)_pdf.exe")

GuLoader payload URL (AgentTesla):
https://drive.google.com/uc?export=download&id=1Trzyb2eW-3WLdj4BQQq_kissPU1THWy5

AgentTesla SMTP exfil server:
us2.smtp.mailhostbox.com:587 (208.91.198.143)

Intelligence


File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-04 01:07:36 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaFileOpen
MSVBVM60.DLL::__vbaErrorOverflow

Comments