MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f9c9ae2d4c5a041545e0aba32a7772af15c65a912debe1eb6ccd4f297532b43b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f9c9ae2d4c5a041545e0aba32a7772af15c65a912debe1eb6ccd4f297532b43b
SHA3-384 hash: 65bb2f7d2ba58590bd12d92f921d1356043a6592735c2bc4f4cecc7f92a6ea2f608df74d0530d8abb131e6e2e76aa2bf
SHA1 hash: ea06fab35b04c8a13b8584fc8aa915f08d0a45c9
MD5 hash: 985a6089824d3bfb41326e4b5351fb5e
humanhash: purple-crazy-steak-avocado
File name:Read Message Delivery Failure Text.zip
Download: download sample
Signature AgentTesla
File size:417'898 bytes
First seen:2022-03-14 06:09:12 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:gVzWVxATjCanUDxKlMxETXBZHozghy+fTsEO7wemYa6NnJ9m3dO2lu9WY4QX4jdd:gWGMoMuBZIEhxAEgweF39m3C9Ww4qgKM
TLSH T1FA9423D056C997E47B252410AD7BEA1DB8D1C4EB43158BA26D3AA914237FCEC93C73C2
Reporter fabjer
Tags:AgentTesla zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-03-14 06:10:14 UTC
File Type:
Binary (Archive)
Extracted files:
94
AV detection:
10 of 42 (23.81%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
collection persistence spyware stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

77756c6782326707bd8a3b1d082c67a4095d2ab7f9d9497ffda8934f2a83bbfa

AgentTesla

zip f9c9ae2d4c5a041545e0aba32a7772af15c65a912debe1eb6ccd4f297532b43b

(this sample)

  
Dropped by
SHA256 77756c6782326707bd8a3b1d082c67a4095d2ab7f9d9497ffda8934f2a83bbfa
  
Delivery method
Distributed via e-mail attachment

Comments