MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cb02efcc2f6504dc44c9ea4ceb02879374d3e1995c4960a6f85914b03690d39a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 7
| SHA256 hash: | cb02efcc2f6504dc44c9ea4ceb02879374d3e1995c4960a6f85914b03690d39a |
|---|---|
| SHA3-384 hash: | 991bd858d8b8a53d6caa632a85aac2516361608e34a04d8d3ae2c4fa17fa40b180efad9fc7b9491ff57e4dd227458871 |
| SHA1 hash: | 156254e93f3d8038a59ac150568a1453b550b3a6 |
| MD5 hash: | 8f79646049c9920efd752e3607fdf78d |
| humanhash: | leopard-summer-aspen-vegan |
| File name: | Certificates Profile Details Of Our Company.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 557'056 bytes |
| First seen: | 2020-11-19 06:56:47 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 28f23f3d8e8caef0d96e308e79b83dbf (1 x Matiex, 1 x AgentTesla, 1 x MassLogger) |
| ssdeep | 6144:rucgp6uipI0Xyo7/Zza5k0O2cocD0WHIS4CoL0z/Z2x47x:rCpFV03e60PcocDBHISC6/Z2x47x |
| Threatray | 2 similar samples on MalwareBazaar |
| TLSH | 64C4492073708770C0B21F30D4654E4EDE2A7E282E7D65BEB75CF648D67B6820669ED2 |
| Reporter | |
| Tags: | AgentTesla exe |
abuse_ch
Malspam distributing unidentified malware:HELO: mail0.boardtrip.xyz
Sending IP: 178.128.129.229
From: Amacon Makgoka<amacon.makgoka@hotmail.com>
Subject: RE: RFQ Request For New Order With Reference: AMABINIF0865
Attachment: Certificates Profile Details Of Our Company.7z (contains "Certificates Profile Details Of Our Company.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a file
Running batch commands
Unauthorized injection to a recently created process
Launching a process
Sending a UDP request
Reading critical registry keys
DNS request
Sending a custom TCP request
Enabling autorun by creating a file
Result
Gathering data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
60 / 100
Signature
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-11-19 06:57:06 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
suspicious
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
cb02efcc2f6504dc44c9ea4ceb02879374d3e1995c4960a6f85914b03690d39a
MD5 hash:
8f79646049c9920efd752e3607fdf78d
SHA1 hash:
156254e93f3d8038a59ac150568a1453b550b3a6
SH256 hash:
5936208ee2143f1dd9db049e073293c00a9b3b3c56a13c0c700f048150e097df
MD5 hash:
679fecba362c2d542ff4bc2c7da4b4c7
SHA1 hash:
68e1ec92fa5e81e690cb694267c03fd3b5f4d93a
Detections:
win_masslogger_w0
SH256 hash:
1c8a713c2f4081f2dc320a4d6d366dd25b583d9840279e119cca6936230fb076
MD5 hash:
28d15e1bdd0f3a2ff2fff996e87eab27
SHA1 hash:
bc049d7a31f4a0e6a42030894873409ff0e01956
Detections:
win_masslogger_w0
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.