MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 13
| SHA256 hash: | 25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad |
|---|---|
| SHA3-384 hash: | b47d0eb27483bb90f5151d2e62b91bcb3b62be857b32326cf73c3272e4101f5f29e2bb74635914d5545512f0995918bb |
| SHA1 hash: | 77b62319690464354a112d6c9df218ef9ad859d7 |
| MD5 hash: | 4c35e82dbb2a4b8da1c55c81b4ecbfab |
| humanhash: | thirteen-hawaii-east-lithium |
| File name: | 25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'078'784 bytes |
| First seen: | 2024-09-09 11:58:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | bd3825b6e0410966f0c31f64b6c7644a (36 x AgentTesla, 15 x Formbook, 6 x RemcosRAT) |
| ssdeep | 24576:lAHnh+eWsN3skA4RV1Hom2KXcmtck/f/Krx:Uh+ZkldoPKsackfK |
| Threatray | 160 similar samples on MalwareBazaar |
| TLSH | T1A135AD0273D1C036FFABA2739B6AE6055AB87D254133852F13981D79BD701B2273E762 |
| TrID | 49.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 22.7% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
422
Origin country :
HUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad
Verdict:
No threats detected
Analysis date:
2024-09-09 12:12:33 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
Autoit
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed shell32
Verdict:
Malicious
Labled as:
AIT:Trojan.Nymeria
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Formbooks
Status:
Malicious
First seen:
2024-09-09 11:59:05 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 150 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
AutoIT Executable
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
ba5c6ddbc355197232aaee9fbc7043f17a5419fcf644184bd7f11cebf85eab7b
MD5 hash:
47341ea81fe9a902f4b10ecfc9e69ccf
SHA1 hash:
18495a225b1952b086aa71e27f5fb99795e52b69
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
c62267c0ef0af138ffca07372e24e4fb0681d0f1b87bfe798a33a14265791985
744daca400af1f5721eaa529ec3fe427e4837e17ff4766f6bb39643aa488bfee
4e1b00dd1374c6d922e8a141562bbf88f69961e3034a6158007cf2ced5c31c62
df42aed98863b49a6f208ef3181f08ba5014cc3192c3a406dad6def44e4a3c14
f9ae0d40d4f2b88956a1ccfe6cff9aae6a36508574a56595c331d7ca207e5f03
9f1106f2ccae0b0bec34ba75bfc0dbd38367d2e361ab2aebcbf261791925ca64
d2f50ffb5f06255d27d26243697529f4a41772bd2b8de1cd0ba605f10baccd50
8ed8b891d4aa6f1b7935ec3c298d781403c4ba67b1f8e2e6cc7076b7c94a15ce
8dc055b7b9e0b9a68c9ad2a0305410a75b0ea3dc441c60a3acf44cce47415fc1
25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad
db7d96f8ee567f9358b4746b7d2ee4d39c66cb2854ddfbe80ac2d878caf1b132
744daca400af1f5721eaa529ec3fe427e4837e17ff4766f6bb39643aa488bfee
4e1b00dd1374c6d922e8a141562bbf88f69961e3034a6158007cf2ced5c31c62
df42aed98863b49a6f208ef3181f08ba5014cc3192c3a406dad6def44e4a3c14
f9ae0d40d4f2b88956a1ccfe6cff9aae6a36508574a56595c331d7ca207e5f03
9f1106f2ccae0b0bec34ba75bfc0dbd38367d2e361ab2aebcbf261791925ca64
d2f50ffb5f06255d27d26243697529f4a41772bd2b8de1cd0ba605f10baccd50
8ed8b891d4aa6f1b7935ec3c298d781403c4ba67b1f8e2e6cc7076b7c94a15ce
8dc055b7b9e0b9a68c9ad2a0305410a75b0ea3dc441c60a3acf44cce47415fc1
25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad
db7d96f8ee567f9358b4746b7d2ee4d39c66cb2854ddfbe80ac2d878caf1b132
SH256 hash:
25512e04d8b4608cc9b3018d5315cd2645a78c18f62b198a012e9e562efde2ad
MD5 hash:
4c35e82dbb2a4b8da1c55c81b4ecbfab
SHA1 hash:
77b62319690464354a112d6c9df218ef9ad859d7
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.DLL::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.DLL::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::SetSystemPowerState KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::LoadLibraryExW KERNEL32.DLL::LoadLibraryW KERNEL32.DLL::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WriteConsoleW KERNEL32.DLL::ReadConsoleW KERNEL32.DLL::SetStdHandle KERNEL32.DLL::GetConsoleCP KERNEL32.DLL::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileExW KERNEL32.DLL::CopyFileW KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateHardLinkW KERNEL32.DLL::CreateFileW IPHLPAPI.DLL::IcmpCreateFile |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.DLL::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.