MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e
SHA3-384 hash: eb5ebc17f35316dca3ff93e3f3bf853a7057751b6028bed84ea9a605410a91bf0487fc2db05a21319f98f11ae6b51e72
SHA1 hash: 1ba5ebd26b62ec8abc846fe67b812493862978ed
MD5 hash: a1b019d4fae8f5f9728e78151a8ed69f
humanhash: undress-video-angel-aspen
File name:PAYMENT PROOF.exe
Download: download sample
Signature AgentTesla
File size:362'496 bytes
First seen:2020-09-21 09:12:44 UTC
Last seen:2020-09-21 09:36:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c458ff2d515beb8f44158cd3636a7400 (19 x AgentTesla, 6 x NetWire, 3 x HawkEye)
ssdeep 6144:dvB9U/NhUTtwQmh1+cOPfezP2tSTcRmpbT5DExuKu3yP7ooLMM:dZ9U/NMKf+cGoTcRcbTFEwVyp
Threatray 1'604 similar samples on MalwareBazaar
TLSH 1E742361925DC9FBF6095BB98337D52A4311C43353093A71A816EEAE28393E7CACD1C4
Reporter cocaman
Tags:AgentTesla exe


Avatar
cocaman
Malicious email (T1566.001)
From: "" shirley@createtheremarkable.com" <shirley@createtheremarkable.com>"
Received: "from server1.citgroupltd.com (server1.citgroupltd.com [213.246.108.82]) "
Date: "Mon, 21 Sep 2020 09:53:54 +0100"
Subject: "PAYMENT PROOF"
Attachment: "PAYMENT PROOF.exe"

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Reading critical registry keys
Creating a window
Unauthorized injection to a recently created process
Using the Windows Management Instrumentation requests
Sending a UDP request
Moving of the original file
Stealing user critical data
Changing the hosts file
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Executable has a suspicious name (potential lure to open the executable)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the hosts file
Moves itself to temp directory
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-09-21 01:48:13 UTC
File Type:
PE (Exe)
Extracted files:
61
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 1366510b06b23b46e8de8bb22e63cc6052bed981f3b41aecc23fb8e6c654734e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments