MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d2f7e49186d74f6e8a320d41283d88fcd785f4b1e06abd18553ebc14b8c9f17. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 0d2f7e49186d74f6e8a320d41283d88fcd785f4b1e06abd18553ebc14b8c9f17
SHA3-384 hash: 25e86b33fc593dce619b0b2eb94f4dcd20fff01895cf72086083877e79d5acd7b8007e58bab996d733b8b673f2c09a63
SHA1 hash: 56af8b5fcbfe1695714c27de8f80a6989b70a286
MD5 hash: 9b659ab9e37c7869688c9b92ec8bfa62
humanhash: twelve-lima-seventeen-princess
File name:PURCHASE ORDER 20230117,pdf.exe
Download: download sample
Signature AgentTesla
File size:1'595'392 bytes
First seen:2023-07-25 14:56:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ea8d56a6b9f4ce307f716636038657d2 (1 x ModiLoader, 1 x AveMariaRAT, 1 x AgentTesla)
ssdeep 24576:rbGHGrOrQ9gnMC6LO3cQoikKgti8PM2MCUrTDLwVIf2IOXkDtZ3Npts4bJZ:rbGWAJeDingti8P+TwSNO0n9vJbJZ
Threatray 1 similar samples on MalwareBazaar
TLSH T18475E11972D0953BE163193CEC0B439AD869FD757B34EC866AF42C9C6E28B513C291CB
TrID 84.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.2% (.SCR) Windows screen saver (13097/50/3)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon dc1bcbc4c4c4c4b4 (3 x ModiLoader, 1 x AgentTesla, 1 x Formbook)
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
AgentTesla C2:
http://jimbo.ydns.eu/jimboori/inc/def4f4924bdf6e.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PURCHASE ORDER 20230117,pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-07-25 15:03:06 UTC
Tags:
dbatloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, RedLine
Detection:
malicious
Classification:
troj
Score:
88 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1279271 Sample: PURCHASE_ORDER_20230117,pdf.exe Startdate: 25/07/2023 Architecture: WINDOWS Score: 88 21 Found malware configuration 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Yara detected DBatLoader 2->25 27 4 other signatures 2->27 7 PURCHASE_ORDER_20230117,pdf.exe 2->7         started        process3 dnsIp4 15 xcswxg.am.files.1drv.com 7->15 17 web.fe.1drv.com 7->17 19 2 other IPs or domains 7->19 29 Writes to foreign memory regions 7->29 11 logagent.exe 7->11         started        signatures5 process6 process7 13 WerFault.exe 11->13         started       
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-07-25 14:57:10 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader collection trojan
Behaviour
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
ModiLoader Second Stage
ModiLoader, DBatLoader
Suspicious use of NtCreateProcessOtherParentProcess
Unpacked files
SH256 hash:
36f60fb09684923e86b288e69e45837bb133ef1d3239bd3cc35964babe72a80d
MD5 hash:
8156c46fcb7fd2624f3e268f1941659f
SHA1 hash:
50d49c1ea1b9f27b02dca6a97bcd9b5af57c1d79
Detections:
win_dbatloader_g1
SH256 hash:
0d2f7e49186d74f6e8a320d41283d88fcd785f4b1e06abd18553ebc14b8c9f17
MD5 hash:
9b659ab9e37c7869688c9b92ec8bfa62
SHA1 hash:
56af8b5fcbfe1695714c27de8f80a6989b70a286
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments