MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c91b31fb14eff751d72b07b53b3d1d71a63dce9cc61bbef4c939cbd671090585. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | c91b31fb14eff751d72b07b53b3d1d71a63dce9cc61bbef4c939cbd671090585 |
|---|---|
| SHA3-384 hash: | e1f6ac42cd41138a11fc749efe20b38fda0d808bbc112d76066bba0b60376e32efdbd728421b5f90612903d89826a52f |
| SHA1 hash: | 3db2cc9fcf8a6fa447ddee56aa3d956e842bf8d2 |
| MD5 hash: | f4eabab73b446adfecb71b0039ae4f3e |
| humanhash: | finch-ceiling-hot-beryllium |
| File name: | DHL Delivery Invoice.com |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 680'960 bytes |
| First seen: | 2024-11-13 07:22:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:cMyC3lNRW4sOx0Tip0NWy9LYhZbpJWjkL4msb1J4r5AZHD:cMyMR0m6h9LYpJWS4Ncr2J |
| Threatray | 2'492 similar samples on MalwareBazaar |
| TLSH | T1BFE412647958D622CAE907B55172D37A07B58D8DF436D3238FEEECEB3816706EA10243 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla com DHL exe |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.