MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ccaf0ffdf34b0ba7b1d23643c2ebccf38aadfba5531ee170b39649f87e19be4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: ccaf0ffdf34b0ba7b1d23643c2ebccf38aadfba5531ee170b39649f87e19be4a
SHA3-384 hash: dc4c7003e968b81ccbea2e9fb57d8fdcde1c46d2b70a1ba5aaa21167335f3279b1d2ae319313d8e58ade316fb7905941
SHA1 hash: 11b3e4bdff3db32faf677123bad57b4ff0c762bb
MD5 hash: eeb921c4968ce94b853986c2157ddba5
humanhash: maryland-ack-orange-april
File name:COMPANY DOCUMENTS.tar
Download: download sample
Signature AgentTesla
File size:615'258 bytes
First seen:2021-06-09 06:04:04 UTC
Last seen:Never
File type: tar
MIME type:application/x-rar
ssdeep 12288:hWPrlQooyLs+JzHERDx7hPA5Q/bzivRMbbupS+qbtR52N:EPrGos+QRlhPAmbzivabbupZqT52N
TLSH DED423B84699E06A4DF3C4BE75926C0CF25D60458FBE4715F51F0E582A90FAD0BF08AE
Reporter cocaman
Tags:tar


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?b?0JzQsNC70L7RhdCw0YI=?= <issa.alkharousi@arapetroleum.com>" (likely spoofed)
Received: "from mail.uzavtoyul.uz (mail.uzavtoyul.uz [195.158.25.118]) "
Date: "Wed, 9 Jun 2021 08:13:29 +0500"
Subject: "OC Federal Mogul 2106040271"
Attachment: "COMPANY DOCUMENTS.tar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-09 06:04:13 UTC
File Type:
Binary (Archive)
Extracted files:
51
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

tar ccaf0ffdf34b0ba7b1d23643c2ebccf38aadfba5531ee170b39649f87e19be4a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments