MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: 11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83
SHA3-384 hash: 900cfc54fef3d1d7e691fc7e8b96f4157fc5a327946b3e4d7118930472007536c83e88b2a29347c3f3b36f8a04dde7bd
SHA1 hash: c5d88b5d452b31fda9a1041cf3a8ff7f9824e833
MD5 hash: 452b0808adab3fc3917dbbe08260bccc
humanhash: bulldog-sink-hydrogen-seven
File name:PO 00073635300 QWE2024081089.exe
Download: download sample
Signature AgentTesla
File size:1'063'936 bytes
First seen:2024-11-27 19:45:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger)
ssdeep 24576:gtb20pkaCqT5TBWgNQ7aJoUV+Jr0gz6A:pVg5tQ7aJoUVyx5
Threatray 3'932 similar samples on MalwareBazaar
TLSH T10735CF2373DE8361C3B25273BA557702AEBF782506B1F86B2FD4093DE920161525EA73
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon e4828602b22ab694 (27 x RedLineStealer, 8 x AgentTesla, 4 x MassLogger)
Reporter TeamDreier
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
446
Origin country :
DK DK
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83
Verdict:
Malicious activity
Analysis date:
2024-11-27 01:24:23 UTC
Tags:
exfiltration smtp stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm anti-vm autoit compiled-script evasive explorer fingerprint keylogger lolbin microsoft_visual_cc mmc packed packed packer_detected phishing
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2024-11-26 07:26:38 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
AgentTesla
Agenttesla family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7eb32e51ee73598dda879f5c33be29707dd09552a0331af4b770941fcdf4c12b
MD5 hash:
c19018cc39ee33bd8a82b5e9bd75cb1f
SHA1 hash:
28b7267d89d0a3cf2174e762ba2d8663bbb8a8c1
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83
MD5 hash:
452b0808adab3fc3917dbbe08260bccc
SHA1 hash:
c5d88b5d452b31fda9a1041cf3a8ff7f9824e833
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 11472da8edf12afe8d644990869854bdaf333a500f7b44a68c02520068699c83

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
IPHLPAPI.DLL::IcmpCreateFile
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments