MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e53e055f73bf831b81bdfbfebd66fa4168a637322af475e226d1d591cf49127c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e53e055f73bf831b81bdfbfebd66fa4168a637322af475e226d1d591cf49127c
SHA3-384 hash: 7f170ec4bba8eb201f8a6113fa2606576b421e0df9c432216b776986c912e1ecd0579cc8c01ebf7035a615c26d2254c9
SHA1 hash: e496ed84f3881020d3a2a191d82d19906a2be70b
MD5 hash: fc17d1c66efb0295841b8c3e98e43585
humanhash: stream-happy-mango-hawaii
File name:proforma invoice packing list.7z
Download: download sample
Signature AgentTesla
File size:610'505 bytes
First seen:2021-12-01 14:19:42 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:KaH+JztUevDCtBQDVxSAoN1zGYOvF+ZMTl+eycUwYyESNOKzM:hUPvGLxAoNZG7YkQeyGESNOKzM
TLSH T1A3D42382593DDDBB266856DA63E95A3C630CD43CEF065D0F2AB07C7D4A108B273D19AC
Reporter cocaman
Tags:7z AgentTesla INVOICE


Avatar
cocaman
Malicious email (T1566.001)
From: "funami-int <funami-int@caminoacasa.es>" (likely spoofed)
Received: "from caminoacasa.es (unknown [185.222.58.155]) "
Date: "1 Dec 2021 12:46:27 +0100"
Subject: "Over Due proforma invoice for payment"
Attachment: "proforma invoice packing list.7z"

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-12-01 13:17:25 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
23 of 45 (51.11%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot2129831935:AAFsDWWUF1IwkP0mys1D0YX41mjPAs-L-eU/sendDocument
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z e53e055f73bf831b81bdfbfebd66fa4168a637322af475e226d1d591cf49127c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments