MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 11885a82a89f173bfc56ada0cc3dffd97b8b75f267f1a74bf7e4e2c52af88170. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 13
| SHA256 hash: | 11885a82a89f173bfc56ada0cc3dffd97b8b75f267f1a74bf7e4e2c52af88170 |
|---|---|
| SHA3-384 hash: | d45121214c7dbcfd42986472c2c7827432f2c3c6e140064978062215b98141e01a1eac52cb1535bd75dc5a70e6107fb9 |
| SHA1 hash: | bb3f7a421c2e0d09e9f317a17f5c7b8d6aa64262 |
| MD5 hash: | a58fa746c690621ab70569fa5816d418 |
| humanhash: | harry-kentucky-august-blossom |
| File name: | 11885a82a89f173bfc56ada0cc3dffd97b8b75f267f1a74bf7e4e2c52af88170 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'040'896 bytes |
| First seen: | 2024-09-09 11:49:35 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | bd3825b6e0410966f0c31f64b6c7644a (36 x AgentTesla, 15 x Formbook, 6 x RemcosRAT) |
| ssdeep | 24576:fAHnh+eWsN3skA4RV1Hom2KXcmtc5Rwutbkm:Ch+ZkldoPKsac5lt |
| Threatray | 160 similar samples on MalwareBazaar |
| TLSH | T135259D0273D5C036FFABA2739B6AB2055AB97D250133852F13981D79BD701B2273E762 |
| TrID | 49.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 22.7% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
428
Origin country :
HUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
11885a82a89f173bfc56ada0cc3dffd97b8b75f267f1a74bf7e4e2c52af88170
Verdict:
No threats detected
Analysis date:
2024-09-09 11:44:40 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Autoit
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed shell32
Verdict:
Malicious
Labled as:
AIT:Trojan.Nymeria
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Formbooks
Status:
Malicious
First seen:
2024-09-05 15:56:13 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 150 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
AutoIT Executable
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f76de7e13236b109f94997a7e83436a3efa5f63726e392516ba364be5619ca22
MD5 hash:
810e7d4fc23dc3fe58dba275217d9281
SHA1 hash:
ff8a2eacbe7a18906b012b688969e171e5724c35
Detections:
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
MALWARE_Win_AgentTeslaV2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
11885a82a89f173bfc56ada0cc3dffd97b8b75f267f1a74bf7e4e2c52af88170
MD5 hash:
a58fa746c690621ab70569fa5816d418
SHA1 hash:
bb3f7a421c2e0d09e9f317a17f5c7b8d6aa64262
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.DLL::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.DLL::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::SetSystemPowerState KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::LoadLibraryExW KERNEL32.DLL::LoadLibraryW KERNEL32.DLL::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WriteConsoleW KERNEL32.DLL::ReadConsoleW KERNEL32.DLL::SetStdHandle KERNEL32.DLL::GetConsoleCP KERNEL32.DLL::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileExW KERNEL32.DLL::CopyFileW KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateHardLinkW KERNEL32.DLL::CreateFileW IPHLPAPI.DLL::IcmpCreateFile |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.DLL::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.