MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67147087feb1efc01a641bda1a605bf30457f1cbc8b0143aa997b3bd323e66b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 67147087feb1efc01a641bda1a605bf30457f1cbc8b0143aa997b3bd323e66b8
SHA3-384 hash: 23ebe63d38bfaa0372355f5dc79190cf8fb3a3de1f81183d6e1bbc89e15d4f0e7702e9bda8bbd6151d6b0516e482f542
SHA1 hash: 99684b449de9c83c9a1c0dc326c693bedd61e59a
MD5 hash: a636c86dbb7161a2cffbd184ff48ec3d
humanhash: two-july-enemy-twelve
File name:IMG-109876787667873432332-232095.exe
Download: download sample
Signature AgentTesla
File size:577'536 bytes
First seen:2020-08-11 13:59:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a18a672aeeae86dc8783de7e30f7d80d (2 x AgentTesla)
ssdeep 12288:Mgu9dxtqrDutMCVFy79ZbWtpfd/WIzmrsB7wF8M3xIrqFAJTiIsJIMEJS:pKXqPh579std2rC7wF8ezrynJ
Threatray 11'003 similar samples on MalwareBazaar
TLSH D8C48C41B245C19AEEC105797292EBBA45653D343129CA07FB873B2E3D723DB4126F8B
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: inventive.herosite.pro
Sending IP: 167.99.192.252
From: cuentas <cuentas@afslogistics.in>
Subject: Re: Confirmación de aviso de pago
Attachment: IMG-109876787667873432332-232095.IMG (contains "IMG-109876787667873432332-232095.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a file
Running batch commands
Sending a UDP request
Modifying an executable file
Launching a process
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: MSBuild connects to smtp port
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 261960 Sample: IMG-109876787667873432332-2... Startdate: 11/08/2020 Architecture: WINDOWS Score: 100 39 Found malware configuration 2->39 41 Yara detected AgentTesla 2->41 43 Sigma detected: MSBuild connects to smtp port 2->43 45 3 other signatures 2->45 8 IMG-109876787667873432332-232095.exe 3 2->8         started        process3 file4 31 C:\Users\user\AppData\Local\...\zenda.exe, PE32 8->31 dropped 33 C:\...\d9b898d6f1924b7395f3f4df1302c0b9.xml, XML 8->33 dropped 11 IMG-109876787667873432332-232095.exe 1 8->11         started        13 MSBuild.exe 8->13         started        16 cmd.exe 1 8->16         started        process5 signatures6 18 IMG-109876787667873432332-232095.exe 1 11->18         started        21 MSBuild.exe 11->21         started        61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 13->61 63 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 13->63 23 conhost.exe 16->23         started        25 schtasks.exe 1 16->25         started        process7 signatures8 47 Writes to foreign memory regions 18->47 49 Allocates memory in foreign processes 18->49 51 Injects a PE file into a foreign processes 18->51 27 MSBuild.exe 4 18->27         started        process9 dnsIp10 35 chenklins.com 89.45.67.200, 49734, 587 BELCLOUDBG Netherlands 27->35 37 mail.chenklins.com 27->37 53 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->53 55 Tries to steal Mail credentials (via file access) 27->55 57 Tries to harvest and steal ftp login credentials 27->57 59 2 other signatures 27->59 signatures11
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-11 13:12:48 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
keylogger stealer spyware trojan family:agenttesla
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 67147087feb1efc01a641bda1a605bf30457f1cbc8b0143aa997b3bd323e66b8

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments