MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3029eb76575a110e9bfeadcee488cb4db00d25da6d8529e48d49f2fee0770f80. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 3029eb76575a110e9bfeadcee488cb4db00d25da6d8529e48d49f2fee0770f80
SHA3-384 hash: 86a6adb79c60f9b09aa1a11b2e315082a8ce732bfaea9ac304999b51be6acff1f97fe3ed250e67305e390c4bb4cecb7d
SHA1 hash: df39b8d79ca797d9dc594f62d705682b4ec7d634
MD5 hash: 26aa84b983564ccd62143b164ffa7f62
humanhash: music-vermont-island-spaghetti
File name:SecuriteInfo.com.Heur.25013.20090
Download: download sample
Signature AgentTesla
File size:646'656 bytes
First seen:2024-04-29 17:19:51 UTC
Last seen:2024-04-30 06:16:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:mZMAvNlMfHJ2zJWfs+Pk8xVv5x9+AeVmxgU5hT3ETB778Qm:jAw2zJWfs+s8HjnXgWhUTB0
Threatray 603 similar samples on MalwareBazaar
TLSH T1BED42315268D1771ED3EBFB52E611A0B2760A0060FE0E19E6CC54E9FBD79B608DC2367
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Reporter SecuriteInfoCom
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
5
# of downloads :
333
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
3029eb76575a110e9bfeadcee488cb4db00d25da6d8529e48d49f2fee0770f80.exe
Verdict:
Malicious activity
Analysis date:
2024-04-29 17:22:43 UTC
Tags:
smtp exfiltration stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Sending an HTTP GET request
Setting a keyboard event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1433571 Sample: SecuriteInfo.com.Heur.25013... Startdate: 29/04/2024 Architecture: WINDOWS Score: 100 70 mail.starmech.net 2->70 72 api.ipify.org 2->72 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 Antivirus / Scanner detection for submitted sample 2->86 88 12 other signatures 2->88 8 SecuriteInfo.com.Heur.25013.20090.exe 7 2->8         started        12 yNoWANrisVl.exe 2->12         started        14 BjTxJte.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 60 C:\Users\user\AppData\...\yNoWANrisVl.exe, PE32 8->60 dropped 62 C:\Users\user\AppData\Local\...\tmp7575.tmp, XML 8->62 dropped 104 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->104 106 Uses schtasks.exe or at.exe to add and modify task schedules 8->106 108 Adds a directory exclusion to Windows Defender 8->108 19 SecuriteInfo.com.Heur.25013.20090.exe 16 5 8->19         started        24 powershell.exe 22 8->24         started        34 2 other processes 8->34 110 Antivirus detection for dropped file 12->110 112 Multi AV Scanner detection for dropped file 12->112 114 Machine Learning detection for dropped file 12->114 26 yNoWANrisVl.exe 12->26         started        28 schtasks.exe 12->28         started        116 Injects a PE file into a foreign processes 14->116 30 BjTxJte.exe 14->30         started        36 2 other processes 14->36 64 192.168.2.16 unknown unknown 16->64 66 192.168.2.4, 138, 443, 49672 unknown unknown 16->66 68 3 other IPs or domains 16->68 32 BjTxJte.exe 16->32         started        38 3 other processes 16->38 file6 signatures7 process8 dnsIp9 74 mail.starmech.net 207.174.215.249, 49734, 49738, 49751 PUBLIC-DOMAIN-REGISTRYUS United States 19->74 76 api.ipify.org 104.26.13.205, 443, 49733, 49737 CLOUDFLARENETUS United States 19->76 56 C:\Users\user\AppData\Roaming\...\BjTxJte.exe, PE32 19->56 dropped 58 C:\Users\user\...\BjTxJte.exe:Zone.Identifier, ASCII 19->58 dropped 90 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->90 92 Tries to steal Mail credentials (via file / registry access) 19->92 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->94 96 Loading BitLocker PowerShell Module 24->96 40 conhost.exe 24->40         started        42 WmiPrvSE.exe 24->42         started        44 conhost.exe 28->44         started        98 Tries to harvest and steal ftp login credentials 32->98 100 Tries to harvest and steal browser information (history, passwords, etc) 32->100 102 Installs a global keyboard hook 32->102 46 conhost.exe 34->46         started        48 conhost.exe 34->48         started        50 conhost.exe 36->50         started        52 conhost.exe 36->52         started        78 www.google.com 142.250.190.68, 443, 49742, 49756 GOOGLEUS United States 38->78 80 google.com 38->80 54 conhost.exe 38->54         started        file10 signatures11 process12
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2024-04-29 16:13:35 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
24 of 38 (63.16%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
2ceda0837f68b76889912621972b810fef37bbb5efbfe6942ccbf33f88a44a81
MD5 hash:
b6fdac1e3513099a9afb0bc8d52d74ee
SHA1 hash:
c03d64fba723fcd233426bff47329ab7c51553b7
SH256 hash:
cfb1272468ba99379ced1feb64582d18566014122d8130889e92d8a41c525415
MD5 hash:
1bc16acd6ce539f429c67e0d0790b035
SHA1 hash:
a20468be1c8a77dc119938d0f9dc7d7a9a272358
SH256 hash:
ab737fa94d5638dc23955700ae5443fa7a05882c821c51b995935a91e42c3561
MD5 hash:
8ae00a26ba2f9f1d519fd6455db2cb4d
SHA1 hash:
9270d95cc7f7a8d1915de694d54a550b3c683684
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
8213a6a34c36db37675298dcbbbb36451ddf233c1af7e8783be225d3e4c08271
MD5 hash:
a2f5dafc17432fdea2f85c9c972167ca
SHA1 hash:
004139faa5268e3fd9fcc92710d0e331d32a2d7b
SH256 hash:
3029eb76575a110e9bfeadcee488cb4db00d25da6d8529e48d49f2fee0770f80
MD5 hash:
26aa84b983564ccd62143b164ffa7f62
SHA1 hash:
df39b8d79ca797d9dc594f62d705682b4ec7d634
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 3029eb76575a110e9bfeadcee488cb4db00d25da6d8529e48d49f2fee0770f80

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments