MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d74a4cdc37bedadf721932a6118039ab332781ccbb8f00d9c763da4602ef6fda. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d74a4cdc37bedadf721932a6118039ab332781ccbb8f00d9c763da4602ef6fda
SHA3-384 hash: f20c660964b34bd8417679b37ebd2008774cab041bf32826e69d20d1427a8618e2656c56f0647ee8194e5baa1014dc31
SHA1 hash: 0b65d049f1c476d8b190c5eae97e5afc90656ae6
MD5 hash: 693ebae896e9bbc408a2d5fb6bc40695
humanhash: maine-yankee-purple-hydrogen
File name:DHL00117392073PDF.EXE
Download: download sample
Signature AgentTesla
File size:886'272 bytes
First seen:2020-07-27 07:59:01 UTC
Last seen:2020-07-28 07:42:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:ATLZUTfytEzCdQgcYd6v0e2OhclyugdDnvrFPcNAD18:ATyT/Cd2YdXerhclyDnvhk018
Threatray 483 similar samples on MalwareBazaar
TLSH 94157D3938824538CD3A067188EC9DC37A6536493B95C72F71DB136DBF025AB7B6218E
Reporter cocaman
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
7
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
.NET source code contains very large array initializations
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-27 08:00:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
spyware keylogger trojan stealer family:agenttesla
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe d74a4cdc37bedadf721932a6118039ab332781ccbb8f00d9c763da4602ef6fda

(this sample)

Comments