MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83 |
|---|---|
| SHA3-384 hash: | 900cfc54fef3d1d7e691fc7e8b96f4157fc5a327946b3e4d7118930472007536c83e88b2a29347c3f3b36f8a04dde7bd |
| SHA1 hash: | c5d88b5d452b31fda9a1041cf3a8ff7f9824e833 |
| MD5 hash: | 452b0808adab3fc3917dbbe08260bccc |
| humanhash: | bulldog-sink-hydrogen-seven |
| File name: | PO 00073635300 QWE2024081089.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'063'936 bytes |
| First seen: | 2024-11-27 19:45:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger) |
| ssdeep | 24576:gtb20pkaCqT5TBWgNQ7aJoUV+Jr0gz6A:pVg5tQ7aJoUVyx5 |
| Threatray | 3'932 similar samples on MalwareBazaar |
| TLSH | T10735CF2373DE8361C3B25273BA557702AEBF782506B1F86B2FD4093DE920161525EA73 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10522/11/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | e4828602b22ab694 (27 x RedLineStealer, 8 x AgentTesla, 4 x MassLogger) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
DKVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | RansomPyShield_Antiransomware |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.