MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 daff03c089c0a114d704efa30ca148d8b04d92b0439f9b2a5cb16306623a4379. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: daff03c089c0a114d704efa30ca148d8b04d92b0439f9b2a5cb16306623a4379
SHA3-384 hash: 661224109e7e875a49ca0a5aa64998f8ab39f0f43fea871c59b74a510d68f3c13e99c64818cb80c64be2026c5e0b3113
SHA1 hash: 26d949c53d9908ea29afca771d487c17c9662a1c
MD5 hash: 69d923f9201a74c190fd1888db8805bd
humanhash: bravo-ohio-potato-vegan
File name:Document_BT24PDF.exe
Download: download sample
Signature AgentTesla
File size:993'792 bytes
First seen:2020-07-01 10:28:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:t3YiY0h+aTweDu38k1V2m1Mg039zSdO80eDGvAgQRzG8ONKH9eoFC7Iut7UxlVGO:gx1V2mxW9zSF03nQRyoH9euCZtUxlP
Threatray 122 similar samples on MalwareBazaar
TLSH A7256BD131699BA7C2F393B769388C2943AB0E911075E2B1649D3EEF5B73360C2197E1
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail.siceram.ro
Sending IP: 89.33.44.86
From: Madalina <info@technova.ro>
Subject: FW: Banca Transilvania
Attachment: Document_BT24PDF.iso (contains "Document_BT24PDF.exe")

AgentTesla FTP exfil server:
ftp.solarcenter.ro:21

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-01 10:30:08 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
spyware keylogger trojan stealer family:agenttesla persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Modifies service
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

fe456fd3f69dfecf3c75e6c42103f983

AgentTesla

Executable exe daff03c089c0a114d704efa30ca148d8b04d92b0439f9b2a5cb16306623a4379

(this sample)

  
Dropped by
MD5 fe456fd3f69dfecf3c75e6c42103f983
  
Delivery method
Distributed via e-mail attachment

Comments