MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f91f135e5aecd2e2e8d81ac771475de147b858c1807bde08e47cdf68f545d8da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f91f135e5aecd2e2e8d81ac771475de147b858c1807bde08e47cdf68f545d8da
SHA3-384 hash: a55fc9bfacd328e8af9825d1d1ef430dbe3fe702ddee91ccd2b30316c50627106d8c395e6f35dd1bf582ee528645b97e
SHA1 hash: 77d87412145a994e30a6493e2fe9e272da22e713
MD5 hash: 4a37a3769de56de4edcc8853d50e29e0
humanhash: crazy-island-football-nitrogen
File name:lol.exe
Download: download sample
File size:890'368 bytes
First seen:2020-07-15 12:35:20 UTC
Last seen:2020-07-15 15:22:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 6144:99QGJIWrViX1O3t+LtQcX294mJKhKjPDKh5anhy7cVYxQGJIWrViX1O3t+LtQcXt:zDJIvvde9nJYxDJIvvde9nJYCQy/G
Threatray 217 similar samples on MalwareBazaar
TLSH A215198211451278E168F1FAF60610AAEA04EC3EE1E069B6767DF7168574E33CDC5FAC
Reporter James_inthe_box
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Unauthorized injection to a recently created process
Enabling the 'hidden' option for recently created files
DNS request
Sending a custom TCP request
Connection attempt
Sending an HTTP POST request
Enabling autorun with Startup directory
Deleting of the original file
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-15 10:26:20 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments