MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 061d22ce82c411b7a7a101fcb6fd0836f420b1800a7e5b241089fc819cfd4451. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 061d22ce82c411b7a7a101fcb6fd0836f420b1800a7e5b241089fc819cfd4451 |
|---|---|
| SHA3-384 hash: | 1095438c38349eabd299b20b1eabddfab4971f578b04d111ad076f54da3dc7e38650cb0b899668412a1a6414f09142bb |
| SHA1 hash: | 9e9c2221fd20ff89c4c272a2c0c112853c69acd8 |
| MD5 hash: | 056b1a4dcef4d5aa826fcad477a5e8d4 |
| humanhash: | blossom-missouri-video-mockingbird |
| File name: | New PO - PO#2024EH001.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 657'408 bytes |
| First seen: | 2024-03-04 22:59:26 UTC |
| Last seen: | 2024-03-05 00:40:55 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:7LiwI27oQf+0JwMAS6zdG9SzJyIH0+A1bMJcZTuGj7qNwQ6zg:7LiwIaomJwM3QdGUzJ31mMaZTuGO/6zg |
| TLSH | T13FE4235907951F67FBFE02F13412A411E3B7842B9CB2D7490CCAA2DF5E67B904102B6B |
| TrID | 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.1% (.SCR) Windows screen saver (13097/50/3) 8.9% (.EXE) Win64 Executable (generic) (10523/12/4) 5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | 00786864dcd86000 (3 x AgentTesla, 1 x Loki) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.