MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c |
|---|---|
| SHA3-384 hash: | 620aa9f1a260b1ac9935eebdbcc3e1a4f1188153f5561643324bca5412ed4299b05dabf4d4233006eb1014cb09dae7b2 |
| SHA1 hash: | 1808257e8d2278506967a96bc767582becc1525c |
| MD5 hash: | 7a3bb6d3030ff7c165543f0c687011dc |
| humanhash: | alpha-muppet-pizza-hamper |
| File name: | SecuriteInfo.com.Win32.PWSX-gen.3836.18038 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 866'304 bytes |
| First seen: | 2023-12-17 13:20:59 UTC |
| Last seen: | 2023-12-18 14:16:49 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:h5M+7tb4kDSWlmJ31L4/ziJEoVqdVUXLOu+0pXYCzd2yAjIynhCGnpOKWA:Q+xb4kDpYJIPsOSxwj/hCGUJA |
| TLSH | T17605E43C49BE223796B5C695CBEC8827F05CA46F3141AD7594DBC3A253C6E4278E322D |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | dcdee6baceac9efa (2 x AgentTesla, 1 x SnakeKeylogger) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
3
# of downloads :
488
Origin country :
FRVendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.3836.18038
Verdict:
Malicious activity
Analysis date:
2023-12-17 13:24:14 UTC
Tags:
agenttesla stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTesla
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Reading critical registry keys
DNS request
Sending a custom TCP request
Forced shutdown of a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Detection:
agenttesla
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-17 10:05:28 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
16 of 23 (69.57%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
agenttesla_v4
agenttesla
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
AgentTesla
Unpacked files
SH256 hash:
d01f3dea3851602ba5a0586c60430d286adf6fcc7e17aab080601a66630606e5
MD5 hash:
579197d4f760148a9482d1ebde113259
SHA1 hash:
cf6924eb360c7e5a117323bebcb6ee02d2aec86d
SH256 hash:
c5328f7af843244b56d6a208c322a9315daea139d1b255cda993b243e4394ecf
MD5 hash:
160f4669c06c6496d79a92ea9d33e89b
SHA1 hash:
baae226fdb2a9739f118db781bdc74f2efc6a585
SH256 hash:
9d57ab13eaeeb70ae4c9e5588e675f31ae1425ef3cde7c9d66d1adb4bf267705
MD5 hash:
10cdc7e587da7619d7c158e955c6bca6
SHA1 hash:
0a3003c98c8b306b612d8e445fea139bd7a46e22
SH256 hash:
5e09cafaa3ea8a183a7cf79f55576a3410ae0c49dfd46a9f4fff3cc730e994a9
MD5 hash:
3096e290ffb367eba85882ee47db6827
SHA1 hash:
07820b41d4068f8b3e27940f3fc3cac73c7dc443
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
3af8e8d96431992127c5774977cb7b3ea300c4ef8b23a620f0213f42b79584d9
f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362
4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74
7f382cc5928a8adf09033a4412af83f103fe25384f7fb39343344432fc71f8c1
25ed66335a82f70ae9980bb3f4635398c537b294eeca7728d5994ce9b266ca12
ae74573b2465c82c7251fafa08ed86f4113f2568f21709f57c998371e5a6150b
26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8
76b324f75db6095cf36f6cc55b3b7b9070a8f9ace436920cef5c792dbebebb15
e6370c7eee2c7a1101943e56807d0cac8e977a291385459a4d455d6eb7d821d8
2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
e0b8c5c5f1fcfd52dffabc78f9ce5dedc8598ec30736ec30308cf5b2d4dc4801
700fd6c408ce5d0e3953026e355db953dd3ca0850fedba2f0c772f7dcb18d80b
2a0bae477238b2eb5b2dd0127bd7b1a6396f6512dd6b3dd8b85aef23fcc59322
a3268fd103ce714411b447c75854565ddf366535c6f47641893f0d78f0482bb8
f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362
4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74
7f382cc5928a8adf09033a4412af83f103fe25384f7fb39343344432fc71f8c1
25ed66335a82f70ae9980bb3f4635398c537b294eeca7728d5994ce9b266ca12
ae74573b2465c82c7251fafa08ed86f4113f2568f21709f57c998371e5a6150b
26e3295aa8a473155951d618971b749be570e36898bb7ad0b0e690648e7c2fd8
76b324f75db6095cf36f6cc55b3b7b9070a8f9ace436920cef5c792dbebebb15
e6370c7eee2c7a1101943e56807d0cac8e977a291385459a4d455d6eb7d821d8
2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
e0b8c5c5f1fcfd52dffabc78f9ce5dedc8598ec30736ec30308cf5b2d4dc4801
700fd6c408ce5d0e3953026e355db953dd3ca0850fedba2f0c772f7dcb18d80b
2a0bae477238b2eb5b2dd0127bd7b1a6396f6512dd6b3dd8b85aef23fcc59322
a3268fd103ce714411b447c75854565ddf366535c6f47641893f0d78f0482bb8
SH256 hash:
2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
MD5 hash:
7a3bb6d3030ff7c165543f0c687011dc
SHA1 hash:
1808257e8d2278506967a96bc767582becc1525c
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.