MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd890b3b8d2be8ba19b3fa347622e4f628984938dabec2926d1b22424d3d8cc1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cd890b3b8d2be8ba19b3fa347622e4f628984938dabec2926d1b22424d3d8cc1
SHA3-384 hash: 99f24bf63b18379869750598ab5c0f1095c1fa3511cff3f24830d00176f0d3c8f0caed65046b9b6cfb3008e639fc1579
SHA1 hash: be9f0810e7b6e99fbae73dc1e15107355dd5755d
MD5 hash: bdf3b08d3b7d4ec80598264dcc35d9f7
humanhash: magnesium-carpet-william-comet
File name:QAOTATION.r13.exe
Download: download sample
Signature AgentTesla
File size:376'832 bytes
First seen:2020-11-07 10:27:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3c71e8f02dc3eee71c99d7c46768840f (4 x AgentTesla, 3 x Formbook)
ssdeep 6144:zHX7q20wZiDh+m7APvvGmjxFJ3MXWSkV3Jfb2q1vyV7TmaXAuhr9MSAPVSj9orgz:zHX7z0wXmcLJ8XA5fxa7TmO5tAPVSj9n
Threatray 14 similar samples on MalwareBazaar
TLSH E984F13539C0C073E4A729340670DBB14E3EFA702F65589FA391177AAF743C2962996B
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: safasteel.com
Sending IP: 185.136.170.140
From: sales@safasteel.com
Subject: QAOTATION
Attachment: QAOTATION.r13.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 311002 Sample: QAOTATION.r13.exe Startdate: 07/11/2020 Architecture: WINDOWS Score: 68 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected AgentTesla 2->21 23 Machine Learning detection for sample 2->23 6 QAOTATION.r13.exe 1 2->6         started        process3 process4 8 WerFault.exe 20 9 6->8         started        11 conhost.exe 6->11         started        13 MSBuild.exe 6->13         started        dnsIp5 15 192.168.2.1 unknown unknown 8->15
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-11-06 20:57:19 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
8c3f53a4cadb6ab150cfe8854fb57ec7445794c732713a0d38922ea3414426d8
MD5 hash:
0a3028b559e33541af2049a6229ea6b5
SHA1 hash:
348988911b788bac14790c4a586ee79d5f22fdc6
SH256 hash:
cd890b3b8d2be8ba19b3fa347622e4f628984938dabec2926d1b22424d3d8cc1
MD5 hash:
bdf3b08d3b7d4ec80598264dcc35d9f7
SHA1 hash:
be9f0810e7b6e99fbae73dc1e15107355dd5755d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe cd890b3b8d2be8ba19b3fa347622e4f628984938dabec2926d1b22424d3d8cc1

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments