MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90aa9f9ad74752d2965816d8d68399d2b1c4fdce28c2ca57753196b3a2d60b34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 90aa9f9ad74752d2965816d8d68399d2b1c4fdce28c2ca57753196b3a2d60b34
SHA3-384 hash: 7fb030208f421387eb44308aaa856eb212bd1a1d7aca79e740b35d95c5fa35faa638204f20959bc93a0a880e7332d789
SHA1 hash: e1ab826a557477ce68cf48e89697f448fa75a3d0
MD5 hash: b8365f22144fa34e06f400d7571dd5d7
humanhash: dakota-california-delaware-colorado
File name:IMG-29875676512348765678763-1232323.exe
Download: download sample
Signature AgentTesla
File size:424'448 bytes
First seen:2020-08-05 12:09:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash dca25223c79d933c0a8efd09e5ca88bb (3 x AgentTesla)
ssdeep 12288:2tMXV4KCuoRsSmMoRY68LCakVjvHlBfC/lUqe6SnIHsRMTn:2t+V46x+hnkVjPlBa/yqe6SFR+
Threatray 10'980 similar samples on MalwareBazaar
TLSH DE94D0A1B1C1C075D4B3057277A8EFB244BDB8704594D8D333C2AB9D28752F6AE64E2B
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a file
Running batch commands
Launching a process
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: MSBuild connects to smtp port
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2020-08-05 12:11:13 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
keylogger stealer spyware trojan family:agenttesla
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Reads user/profile data of local email clients
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments