MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fd03c87d6385f3d86400245902c821b496f603105887a05f67eb6948f4c5c085. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 7
| SHA256 hash: | fd03c87d6385f3d86400245902c821b496f603105887a05f67eb6948f4c5c085 |
|---|---|
| SHA3-384 hash: | adaf011c7d242e6014995fc3c1caa3581757602d99ffca21b22840b5edde78059263ccd87937bd3938ff29a4e728ef1f |
| SHA1 hash: | b7cdfb49f1edeabdf3f3d9da3ef6758abc889ab4 |
| MD5 hash: | 85bc261f3b94a42bf4a33c4ae7237b3b |
| humanhash: | massachusetts-fish-georgia-tango |
| File name: | Acil Siparis.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 259'072 bytes |
| First seen: | 2020-10-19 13:23:03 UTC |
| Last seen: | 2020-10-19 14:21:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 3072:JDOphXYf0wjpxqX3u8o26lCpSQCWQ7FITV07BZgfklVEsTHtB5BazqC6Zu4+eXX0:JGXYrpAHh6lCpS7WQ7yUgf+j5Br+a0 |
| Threatray | 10 similar samples on MalwareBazaar |
| TLSH | C1447C58B3DA45ADF2DD9E32AE9127138736FC936FAFC787540671540E333828C51AA2 |
| Reporter | |
| Tags: | AgentTesla exe Telegram |
abuse_ch
Malspam distributing AgentTesla:HELO: ditas.com.tr
Sending IP: 193.142.59.17
From: <tuncayaykac@ditas.com.tr>
Subject: Acil Siparis Talebi
Attachment: Acil Siparis.img (contains "Acil Siparis.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a file in the %AppData% subdirectories
Launching a process
Creating a window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Adds a directory exclusion to Windows Defender
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-19 11:13:01 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
suspicious
Similar samples:
Result
Malware family:
agenttesla
Score:
10/10
Tags:
keylogger trojan stealer spyware family:agenttesla persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
dbd881ab3e29d5c92971a644d63f67f6d93adc801c240f264b5e629ed2c2f769
MD5 hash:
70e8eb8aaf5ae20211e353d57d81c8c2
SHA1 hash:
226f21dd57619573113542d2de72231d0799a372
SH256 hash:
6358978d032f67ed56068f499acde00d2acb6574f5c44b55c5954e4b50e6a8b3
MD5 hash:
6cb8b61aca223feba0ae19da168c2aa8
SHA1 hash:
a824e38b6de5591e16725612df8dae1fd5c6555b
SH256 hash:
fd03c87d6385f3d86400245902c821b496f603105887a05f67eb6948f4c5c085
MD5 hash:
85bc261f3b94a42bf4a33c4ae7237b3b
SHA1 hash:
b7cdfb49f1edeabdf3f3d9da3ef6758abc889ab4
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.