MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e874283490ec44e6cad0729867ee2441d0eb80d76b615455babebc7f5d4ec452. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: e874283490ec44e6cad0729867ee2441d0eb80d76b615455babebc7f5d4ec452
SHA3-384 hash: 1e98da1bde395150e33fa28295cb9790031a896a230201b6c0eb4c4fba90d6cd87f190c341cb58ce459ecdc4139d70ff
SHA1 hash: c087324b1dfa5af8ce6c16994abe5fbcdd9eb30f
MD5 hash: 9d59a022d3dc2777898ffe12bf767f9e
humanhash: hot-burger-island-fanta
File name:SecuriteInfo.com.Variant.Ursu.876064.22478.19393
Download: download sample
Signature AgentTesla
File size:1'128'448 bytes
First seen:2020-08-24 12:58:39 UTC
Last seen:2020-08-26 00:56:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 24576:d3XVwj4ftAJZ/DfMTjfDTGqkl5CvjGRH+86:d3FwxVCvjl
Threatray 363 similar samples on MalwareBazaar
TLSH AB35F72F77189D21C43806B6C5CF4B0913B1E6052A62EF1B3A9D23FD5B1A2D27E463B5
Reporter SecuriteInfoCom
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
3
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Connection attempt to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Connects to many ports of the same IP (likely port scanning)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Scarimson
Status:
Malicious
First seen:
2020-08-24 11:52:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe e874283490ec44e6cad0729867ee2441d0eb80d76b615455babebc7f5d4ec452

(this sample)

  
Delivery method
Distributed via web download

Comments