MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 16 File information Comments

SHA256 hash: 29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a
SHA3-384 hash: bc95bd6b61ab6e2a4b81be2c8cc47d54c6b8cec61760bbdbc15b50cb9e042f34efe122bffeb44a7b2cc09adfb16958ca
SHA1 hash: 73ee9028cbc3d7864af9ceb1ea1a3cdaf72e4d20
MD5 hash: 363dad1f06a03ecedf76ca7742f36daa
humanhash: friend-stream-lion-utah
File name:TEKLİF TALEP VE FİYAT TEKLİFİ_xlxs.exe
Download: download sample
Signature AgentTesla
File size:789'504 bytes
First seen:2024-03-11 13:57:09 UTC
Last seen:2024-03-11 15:28:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:xvnFtImAFNyr+uxiCYJnhXFXq4jWpW75cJJ8P4uBevwquUSvuCSiLu7EIr5:NF61FalilL8Ki8PdquJvbSiS7jr
Threatray 461 similar samples on MalwareBazaar
TLSH T18EF41246736D2F79E13E27FA51722940A3BAB40E4821DADC0CC369DE6A72F045F25B53
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
336
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a.exe
Verdict:
Malicious activity
Analysis date:
2024-03-11 14:58:59 UTC
Tags:
stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Searching for the window
Changing a file
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406709 Sample: TEKL#U0130F TALEP VE F#U013... Startdate: 11/03/2024 Architecture: WINDOWS Score: 100 46 www.google.de 2->46 48 cp8nl.hyperhost.ua 2->48 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Sigma detected: Scheduled temp file as task from temp location 2->64 66 12 other signatures 2->66 9 qINtBxHXiSqEjh.exe 21 2->9         started        12 TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exe 22 2->12         started        signatures3 process4 dnsIp5 68 Multi AV Scanner detection for dropped file 9->68 70 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 9->70 72 Machine Learning detection for dropped file 9->72 16 qINtBxHXiSqEjh.exe 9->16         started        19 schtasks.exe 9->19         started        52 www.google.de 142.250.101.94, 443, 49701, 49706 GOOGLEUS United States 12->52 42 C:\Users\user\AppData\...\qINtBxHXiSqEjh.exe, PE32 12->42 dropped 44 C:\Users\user\AppData\Local\...\tmp550A.tmp, XML 12->44 dropped 74 Adds a directory exclusion to Windows Defender 12->74 76 Injects a PE file into a foreign processes 12->76 21 TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exe 2 12->21         started        24 powershell.exe 22 12->24         started        26 schtasks.exe 1 12->26         started        28 5 other processes 12->28 file6 signatures7 process8 dnsIp9 54 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->54 56 Tries to steal Mail credentials (via file / registry access) 16->56 58 Tries to harvest and steal browser information (history, passwords, etc) 16->58 30 conhost.exe 19->30         started        50 cp8nl.hyperhost.ua 185.174.175.187, 49704, 49707, 587 ITLDC-NLUA Ukraine 21->50 32 conhost.exe 24->32         started        34 WmiPrvSE.exe 24->34         started        36 conhost.exe 26->36         started        38 conhost.exe 28->38         started        signatures10 process11 process12 40 conhost.exe 36->40         started       
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2024-03-08 08:42:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
27
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Unpacked files
SH256 hash:
98935cf8c2dd8c86ce2101608b276bccb57e8d5c546b5b700782b1f4482fff42
MD5 hash:
5027993f288d794377abc49595026ad5
SHA1 hash:
e00ad3f1520265ab8353ed1c314d2e529b0faed4
SH256 hash:
b1f63b3ea7cc065bf6b04d13fdb0c3a43f336045367dac6f45ac49b4d9b2403e
MD5 hash:
a8d01745eed77e9879bcc82a29870a5a
SHA1 hash:
db24b6f7340e7e3b2527e429df2ab48d77ed5a1a
SH256 hash:
c10c9b0882bac6f788f48b4dabe3291b14e639e650f2b9fcb0bc174ac92ae02b
MD5 hash:
7c7fb6daa78beb69128991ff893143ed
SHA1 hash:
c01bb99984b12b84129db80eae1d5d8341a358e2
SH256 hash:
f3c655b7405b888e1b70fc1514624e6679d5275195124dab147d676335a14564
MD5 hash:
6a0dd0417a45366517804ad211553702
SHA1 hash:
005ed2faba3389af1df01ab5a3079b82402c8f75
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
e1b2bdcecafc712713647e95e0a5eb4f66c180d2fe0a357016772a85f7a0b86c
1bf711744adbf1b2de0f3fb5d8abb2966018b61fa5b248de1ba6aaaac8bb681a
bb053a3a97825365645e56cff486dd5b1e25b86a88d66264bdd4cf50a889fb85
91ff4b06f7998bb1adb5e183e8b3440a5f7fa743190f31f58ddf3fada68e51e4
ec7534a141105f0d82f8be59729135367412db7515de7b277687b5facf4d6b44
d328bc308e5ff8ee2d51cef6d963b63a8a498966bbb88a80b672ac680812051c
f769796d247965892aa708ab02692d2ca0f207f7e1c91e05098cd0684e56b29f
9aabc10562a1cf6cb564902721e28fb964f776f2e7c319252d77a3ac8f0deba2
feb0c2c55cd253b97c2c0959c69e88a7849bb33808d4ecb98d4c8da0aa7de9cd
29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a
9a405f12de1dc4e10c3515e36540aeaaabbceb7d3b4857e3d6ecba4c06cc4e8d
56a18ef03d93610834e7b53c24cb389f0f63d8296e2244a4ff1ac3328579cf2e
9ca2b5622a36e207a1d11a748f637920d4f96d88e34b2dede0840bcce07f5788
275f0215c61c0ac28c4da0e355f33fabdf5709dfc46eca4249a76f7925805030
d85a4e28a6003aaf9cf0a6c0bf3f5bee31eb82f39930f8ecec7657dd24093c49
b01f723c553f2255990656cbbfa5835293fd9489d65cd05b3d50799f063c3087
c7a296061f998ed6e86d15eb594248f1cf01f37a909c7b2553dbea7fbc805e2b
fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5
fad3e7058eb2fa88ce97e62a6a243748d6736f9c4e21e4112ed61a40813588b2
19d65215feee20f606dbdd5a4ed5196a96c6bc925df69ad26684a3221aec0521
213ce2632de1980290dd5a2835af6b5200d60bc451a9414b7904d8e30b0de305
707bbd9a748b709cca51737b3a5221c2f77090fa4af2d2bde2598d8fb08e558e
bd60848c5c86d483a65707d9c596938371a2967f18d6eb2f5c3db1140cce2ae2
48dc7a59d9890db7b030f03aba1bb5c64b401e572d4531c7956c8265e846e6fb
62601d311e6061480f42b44495215c0137dd6436e74f5744008687898b28350b
584022a11fa25bc77ada9ec361c791001f8d8da848930b386f42841d9e0be7d6
f145869f71b3a2caf5f0a6ee1b2425efa2b15b1a0344443dfcb63dcadf954534
SH256 hash:
29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a
MD5 hash:
363dad1f06a03ecedf76ca7742f36daa
SHA1 hash:
73ee9028cbc3d7864af9ceb1ea1a3cdaf72e4d20
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Generic_Threat_9f4a80b2
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 29892da2a7bee385ddd6e192ea579f8f35f20134b2a8b5273c0ad10c93040f9a

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments