MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a500592582f35f80169c870dccc416eaf9778f7ec0a43d343764a764222f036. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 0a500592582f35f80169c870dccc416eaf9778f7ec0a43d343764a764222f036
SHA3-384 hash: 05709f1f2839dcfa8389b9dcd35204a4c131923d7aeadbd4a1ec81931e2d36802c2f90bacaac3f51eff15160d979e563
SHA1 hash: 8b65ae26ffd7d9def25f0c1eaaefbc055fecf909
MD5 hash: 3b5082e38db89105b8ad73a0293dd597
humanhash: lemon-violet-september-pip
File name:SecuriteInfo.com.generic.ml.18908
Download: download sample
Signature AgentTesla
File size:985'088 bytes
First seen:2021-02-02 22:20:28 UTC
Last seen:2021-02-02 23:02:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:zbU2eo17RtPmvO9Rlnnzc9Mq7bE47y47nAzVWI:EeNPmW9RlnzcCqv57X7nwW
Threatray 3 similar samples on MalwareBazaar
TLSH B025C05223D47B44D47D6B30C226754083F7E99EE775C61EBC9830DB6A31B88A3E6782
Reporter SecuriteInfoCom
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Advance import payment swift.xlsx
Verdict:
Malicious activity
Analysis date:
2021-02-03 06:13:37 UTC
Tags:
encrypted exploit CVE-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Unauthorized injection to a recently created process
Creating a file
Enabling autorun by creating a file
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Moves itself to temp directory
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM_3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 347673 Sample: SecuriteInfo.com.generic.ml.18908 Startdate: 02/02/2021 Architecture: WINDOWS Score: 100 70 Found malware configuration 2->70 72 Multi AV Scanner detection for dropped file 2->72 74 Sigma detected: Scheduled temp file as task from temp location 2->74 76 10 other signatures 2->76 7 SecuriteInfo.com.generic.ml.exe 7 2->7         started        11 YYtJku.exe 4 2->11         started        13 YYtJku.exe 5 2->13         started        process3 file4 42 C:\Users\user\AppData\Roaming\zWpOSKV.exe, PE32 7->42 dropped 44 C:\Users\user\...\zWpOSKV.exe:Zone.Identifier, ASCII 7->44 dropped 46 C:\Users\user\AppData\Local\...\tmp411F.tmp, XML 7->46 dropped 48 C:\...\SecuriteInfo.com.generic.ml.exe.log, ASCII 7->48 dropped 78 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->78 80 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->80 15 SecuriteInfo.com.generic.ml.exe 2 5 7->15         started        20 schtasks.exe 1 7->20         started        22 SecuriteInfo.com.generic.ml.exe 7->22         started        24 YYtJku.exe 11->24         started        26 schtasks.exe 11->26         started        82 Multi AV Scanner detection for dropped file 13->82 84 Machine Learning detection for dropped file 13->84 28 schtasks.exe 1 13->28         started        30 YYtJku.exe 2 13->30         started        signatures5 process6 dnsIp7 50 sky-qrp.com 66.70.204.222, 49765, 49766, 587 OVHFR Canada 15->50 52 mail.sky-qrp.com 15->52 38 C:\Users\user\AppData\Roaming\...\YYtJku.exe, PE32 15->38 dropped 40 C:\Users\user\...\YYtJku.exe:Zone.Identifier, ASCII 15->40 dropped 58 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->58 60 Moves itself to temp directory 15->60 62 Tries to steal Mail credentials (via file access) 15->62 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->64 32 conhost.exe 20->32         started        54 mail.sky-qrp.com 24->54 56 192.168.2.1 unknown unknown 24->56 66 Tries to harvest and steal ftp login credentials 24->66 68 Tries to harvest and steal browser information (history, passwords, etc) 24->68 34 conhost.exe 26->34         started        36 conhost.exe 28->36         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-02 17:34:00 UTC
AV detection:
10 of 27 (37.04%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence ransomware spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
699e040ae8d267f6f66917a53496519e5135bed26dec3027ef4697c29b245495
MD5 hash:
40887e2207767c8e1bb7265fedbce973
SHA1 hash:
17d7ec194125f2b92af1dd3d3431e44f1fff5d68
SH256 hash:
bd03f1419db658015507630078378ed7b24ed480166fb9855308e78cd249fb44
MD5 hash:
06ba0381250a64535e2ff8dcf4f37907
SHA1 hash:
bb9f2a2c1d8bdabeefcb7b1f0333a47ae144571c
SH256 hash:
d3447a45bc13b91b60c45ecd46541f12f905cb725c8f6d0fd5bf9a1cde305852
MD5 hash:
92ccb02edf49e55c883e07f259fa7e9b
SHA1 hash:
f95d2c5a082abe713304a3c41061db8cde766737
SH256 hash:
0a500592582f35f80169c870dccc416eaf9778f7ec0a43d343764a764222f036
MD5 hash:
3b5082e38db89105b8ad73a0293dd597
SHA1 hash:
8b65ae26ffd7d9def25f0c1eaaefbc055fecf909
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekSHen
Description:AgentTeslaV3 infostealer payload
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 0a500592582f35f80169c870dccc416eaf9778f7ec0a43d343764a764222f036

(this sample)

  
Delivery method
Distributed via web download

Comments