MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ee8cb2212b511830647dcb59d321714d9b2a18ffa2c983b8f17e6cd049adf0fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 12
| SHA256 hash: | ee8cb2212b511830647dcb59d321714d9b2a18ffa2c983b8f17e6cd049adf0fe |
|---|---|
| SHA3-384 hash: | 09d80dfdbd1c2b010faa96455435da1110f62baf2f62f20cf7c7b452a0a996bd22260790cb9b3289db5581f7a48c59b4 |
| SHA1 hash: | e3eda2ab0de49c47aa54b9ca2df356ced6001b68 |
| MD5 hash: | 211ea7546d0136d9a81411f33f65618a |
| humanhash: | oklahoma-finch-apart-tango |
| File name: | 211ea7546d0136d9a81411f33f65618a |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 957'952 bytes |
| First seen: | 2021-07-20 09:21:11 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 24576:KvDBlBPIOBP/GCG1qcwW3XuoA3V/pqh/TDgkEru9:ypPDP/GDtbXvA3qNTDX9 |
| Threatray | 7'072 similar samples on MalwareBazaar |
| TLSH | T1C615E1363217A104DC3887F91C28D1B16BBEAC2A563DC7782EC8EDBF3D726685AD1541 |
| Reporter | |
| Tags: | 32 AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
137
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
211ea7546d0136d9a81411f33f65618a
Verdict:
Malicious activity
Analysis date:
2021-07-20 09:24:39 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTeslaV3
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Found malware configuration
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Behaviour
Behavior Graph:
Detection:
agenttesla
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-19 19:37:33 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 7'062 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
c7b4c0f7bbbbf9ea7e0ac6514106d666d9d7457399e6ccaa51cfddeae1a64a17
MD5 hash:
02a996b81fccc63aee5c54e1d29b1306
SHA1 hash:
ba1f8bd5709bc2bba5b7e353162e82eb53200c23
SH256 hash:
249b94eba522a36982226c36644b367b30af7fe4c5eade4586500247bf87d97d
MD5 hash:
539fd857236554e7d76da2c5f162e77b
SHA1 hash:
8d3eb57abfe71ae01d3d0e78cf8c9085a1884f69
SH256 hash:
6a1d4b1eb5d38327e41f0dcc7b60e63c70dfeb4ede30647b3bdd4d11c71e291a
MD5 hash:
3ef420190a2266fa173593c3f52167c7
SHA1 hash:
8299854b8393f857832c459988d486d74a11bcd2
SH256 hash:
83d9e44d9a311ea6fdbcbd09fdc816a2067806dcacf24beb5ee786191b1a3ea1
MD5 hash:
b1a7b752b6638ee03cffe5a1dde9213e
SHA1 hash:
52d215a173d2f293990f8c12fc7f4a86330a29cb
SH256 hash:
ee8cb2212b511830647dcb59d321714d9b2a18ffa2c983b8f17e6cd049adf0fe
MD5 hash:
211ea7546d0136d9a81411f33f65618a
SHA1 hash:
e3eda2ab0de49c47aa54b9ca2df356ced6001b68
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://maritradeshipplng.com/best/ob.exe