MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 05d0b2865cb2b3ed3cbed435b38bf2436c04c1acad46351d70d011da2f96c3cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 05d0b2865cb2b3ed3cbed435b38bf2436c04c1acad46351d70d011da2f96c3cc |
|---|---|
| SHA3-384 hash: | d024dffeab69ae46bc50285ba96c3dab1362a8b42ae2e3ae87fb24ecc0efd09369c41e792b30b709a9e3cb4d50e4994d |
| SHA1 hash: | d5ba5caeada36a7fbc9b3cad327ce1e71ca00435 |
| MD5 hash: | 5923df60fd65e0d4a4e22d65f52d3d2f |
| humanhash: | fruit-vegan-single-texas |
| File name: | Documenti di spedizione 00028384.bat |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 855'552 bytes |
| First seen: | 2024-09-09 08:14:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'656 x Formbook, 12'248 x SnakeKeylogger) |
| ssdeep | 12288:Tx9Y+no3LopTy34dCOUWxr03jWkBJPc9Y+S/ks5FiB6vCXTDE0/Fi6j:TIMo3qYWlMWkvcK+S/1Y5X80/p |
| Threatray | 3'754 similar samples on MalwareBazaar |
| TLSH | T12805AE0233FC962AF5EF077BF076085847B5F5126217EB8D6845BAFA0E62B508D017A7 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe ftp-concaribe-com Spam-ITA |
Intelligence
File Origin
# of uploads :
1
# of downloads :
440
Origin country :
ITVendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Documenti di spedizione 00028384.bat
Verdict:
Malicious activity
Analysis date:
2024-09-09 08:17:26 UTC
Tags:
stealer agenttesla ftp exfiltration evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
97.4%
Tags:
Execution Generic Infostealer Network Gensteal
Result
Verdict:
Malware
Maliciousness:
Behaviour
Reading critical registry keys
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Stealing user critical data
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
dotnet lolbin masquerade packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_70%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus detection for URL or domain
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Score:
99%
Verdict:
Malware
File Type:
PE
Detection:
agenttesla
Threat name:
ByteCode-MSIL.Trojan.GenSteal
Status:
Malicious
First seen:
2024-09-09 08:14:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
17 of 38 (44.74%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla_v4
agenttesla
Similar samples:
+ 3'744 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla credential_access discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Credentials from Password Stores: Credentials from Web Browsers
AgentTesla
Verdict:
Unknown
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
88a06b0fda4cf308846da8909b70583c3b1f936502cafb05d55857edf190aff4
MD5 hash:
28f94ac26f8d2bc6db9fa5312622848e
SHA1 hash:
28639ba01dc15c0ea91cb5b05eb1036c9763abec
Detections:
win_agent_tesla_g2
Agenttesla_type2
Parent samples :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 hash:
c9e349219802146cbcd205ff391a586f7d5be68d6b3e1966325ad250f82a0a7f
MD5 hash:
5c940c3b9e1e1f3a0d7fa1a3320ca749
SHA1 hash:
06022324ad6ed180e99d446b74cf9b12dfb1b326
SH256 hash:
05d0b2865cb2b3ed3cbed435b38bf2436c04c1acad46351d70d011da2f96c3cc
MD5 hash:
5923df60fd65e0d4a4e22d65f52d3d2f
SHA1 hash:
d5ba5caeada36a7fbc9b3cad327ce1e71ca00435
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.