MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8 |
|---|---|
| SHA3-384 hash: | c05f62e8427b680c55ab3cf0ad6e9c075ef3f073ee0df8681a08b3976ffe1520cd791d17afbbcdcaee5b5b55530b56af |
| SHA1 hash: | 5faeee474fb1c2bd81e7acb467231037c9d6fde2 |
| MD5 hash: | ba1734b5124bfa8c0272693c04b1469e |
| humanhash: | tennis-orange-nebraska-oregon |
| File name: | SecuriteInfo.com.Win32.PWSX-gen.31469.14585 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 657'408 bytes |
| First seen: | 2023-12-14 03:15:04 UTC |
| Last seen: | 2023-12-15 09:12:17 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:/g0oLt5XfVTyYSQBv6EvUbnEzYdbS4iOsUhENFAgaLfAWXG9:/g/XNlXYzxw43gNFAgaTZ29 |
| TLSH | T132E4235833DDAA33C79F6ABAB6A3C1170F7686412FA6D3C69CF0789405B1B8467005B7 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 10f0e8cccccce8f0 (4 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
3
# of downloads :
327
Origin country :
FRVendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.31469.14585
Verdict:
Malicious activity
Analysis date:
2023-12-14 03:17:04 UTC
Tags:
agenttesla stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTesla
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Forced shutdown of a system process
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-14 03:04:21 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
22 of 37 (59.46%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla_v4
agenttesla
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
AgentTesla
Unpacked files
SH256 hash:
d01f3dea3851602ba5a0586c60430d286adf6fcc7e17aab080601a66630606e5
MD5 hash:
579197d4f760148a9482d1ebde113259
SHA1 hash:
cf6924eb360c7e5a117323bebcb6ee02d2aec86d
SH256 hash:
c5328f7af843244b56d6a208c322a9315daea139d1b255cda993b243e4394ecf
MD5 hash:
160f4669c06c6496d79a92ea9d33e89b
SHA1 hash:
baae226fdb2a9739f118db781bdc74f2efc6a585
SH256 hash:
5e09cafaa3ea8a183a7cf79f55576a3410ae0c49dfd46a9f4fff3cc730e994a9
MD5 hash:
3096e290ffb367eba85882ee47db6827
SHA1 hash:
07820b41d4068f8b3e27940f3fc3cac73c7dc443
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
3af8e8d96431992127c5774977cb7b3ea300c4ef8b23a620f0213f42b79584d9
f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362
4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74
7f382cc5928a8adf09033a4412af83f103fe25384f7fb39343344432fc71f8c1
25ed66335a82f70ae9980bb3f4635398c537b294eeca7728d5994ce9b266ca12
ae74573b2465c82c7251fafa08ed86f4113f2568f21709f57c998371e5a6150b
26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8
76b324f75db6095cf36f6cc55b3b7b9070a8f9ace436920cef5c792dbebebb15
e6370c7eee2c7a1101943e56807d0cac8e977a291385459a4d455d6eb7d821d8
2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
e0b8c5c5f1fcfd52dffabc78f9ce5dedc8598ec30736ec30308cf5b2d4dc4801
700fd6c408ce5d0e3953026e355db953dd3ca0850fedba2f0c772f7dcb18d80b
2a0bae477238b2eb5b2dd0127bd7b1a6396f6512dd6b3dd8b85aef23fcc59322
a3268fd103ce714411b447c75854565ddf366535c6f47641893f0d78f0482bb8
f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362
4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74
7f382cc5928a8adf09033a4412af83f103fe25384f7fb39343344432fc71f8c1
25ed66335a82f70ae9980bb3f4635398c537b294eeca7728d5994ce9b266ca12
ae74573b2465c82c7251fafa08ed86f4113f2568f21709f57c998371e5a6150b
26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8
76b324f75db6095cf36f6cc55b3b7b9070a8f9ace436920cef5c792dbebebb15
e6370c7eee2c7a1101943e56807d0cac8e977a291385459a4d455d6eb7d821d8
2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
e0b8c5c5f1fcfd52dffabc78f9ce5dedc8598ec30736ec30308cf5b2d4dc4801
700fd6c408ce5d0e3953026e355db953dd3ca0850fedba2f0c772f7dcb18d80b
2a0bae477238b2eb5b2dd0127bd7b1a6396f6512dd6b3dd8b85aef23fcc59322
a3268fd103ce714411b447c75854565ddf366535c6f47641893f0d78f0482bb8
SH256 hash:
289eb3549a631a1ec022b949180247ed65f18fd4d415f99a5c6130585e064a94
MD5 hash:
b7ad60de1eb8e22715c75f6dd6e3f370
SHA1 hash:
021003e8d41d90746b45dacb393dc8e82800ef75
SH256 hash:
26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8
MD5 hash:
ba1734b5124bfa8c0272693c04b1469e
SHA1 hash:
5faeee474fb1c2bd81e7acb467231037c9d6fde2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.