MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a0393524bb81273a391ec8a495de0d0bbbe17c064c081121637b125d6bfb2f5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 2a0393524bb81273a391ec8a495de0d0bbbe17c064c081121637b125d6bfb2f5
SHA3-384 hash: d9f90b9393714d9d4dbfe409811ec44245d84fc91068b4bc33c968f6388ae27581d93b7c271ed7cea3fe38125dfbbff0
SHA1 hash: fa0780bbcab94c7efba78d59181f9b47fc215274
MD5 hash: 46d71f0a97d0e8cafcb92c8ef4409718
humanhash: lion-kentucky-uncle-nine
File name:46d71f0a97d0e8cafcb92c8ef4409718.exe
Download: download sample
Signature AgentTesla
File size:481'127 bytes
First seen:2023-01-12 16:23:58 UTC
Last seen:2023-01-12 17:36:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 12288:SY2E/Mu9xaHk0CM5KgZ1btWr9WP2EIyMyShS9Q:SYZUu9IHLf5KuIrb9yShS9Q
Threatray 25'047 similar samples on MalwareBazaar
TLSH T16AA4A0B21380E7A9E56328BFFF1BC5A18E61DF137A7BB2891ED31686DD20048D4D65D0
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon f0d4a24b61aac0e0 (1 x AgentTesla)
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
46d71f0a97d0e8cafcb92c8ef4409718.exe
Verdict:
Malicious activity
Analysis date:
2023-01-12 16:26:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Setting a keyboard event handler
DNS request
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2023-01-11 22:38:51 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
22 of 40 (55.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
collection spyware stealer
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
5ca2d213199c17251f3b84f58e764a04f572620f6137fd8975e29fb0fb270073
MD5 hash:
0010750ec4cb6bb73d254d2fc468da05
SHA1 hash:
fc63e61ddab8351f6007be6ef48d66c581c4edbd
SH256 hash:
1d2568f6f782b1fc6a46777d56b86699c2b66769951020936640a2bf65f3d12a
MD5 hash:
4a2222bcf9490b66c5ac03200d40f93e
SHA1 hash:
291314eacecec03489214af2c17fbc107a81de2f
SH256 hash:
e2219e4a1e739c9ece6ca93e95e2f2c934ff43fdc5f3e0f9df6b4edaa73d548c
MD5 hash:
6fe784790c8ad52a6e2c52f9bb036a9f
SHA1 hash:
a51ec93afa6ec1e3b514daf6513a3f718b004b87
SH256 hash:
2a0393524bb81273a391ec8a495de0d0bbbe17c064c081121637b125d6bfb2f5
MD5 hash:
46d71f0a97d0e8cafcb92c8ef4409718
SHA1 hash:
fa0780bbcab94c7efba78d59181f9b47fc215274
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 2a0393524bb81273a391ec8a495de0d0bbbe17c064c081121637b125d6bfb2f5

(this sample)

  
Delivery method
Distributed via web download

Comments