MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: 31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c
SHA3-384 hash: 2ac01f3f1d248a703c52bed5f131a70453692867d20745e6d6014f31a29dd286b6b0a63310929de54acbf77defbe69aa
SHA1 hash: 5d9a100342fe7383479829d2d24343ee735a1826
MD5 hash: d5ee88c8a72921aa9dca20317ed1ef5e
humanhash: xray-texas-skylark-speaker
File name:Swift copy.exe
Download: download sample
Signature AgentTesla
File size:1'163'784 bytes
First seen:2025-01-31 01:40:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:aUMC8CuZtC8YIBKHfaKWBECn6g2s0O8BD48rWHFDW+1RUrC:aU8CJ6BKHfavBECn6gL0O8BD48rWHFDD
TLSH T16B35D0C03B61B308DDAD6A348685EC3597A12DB97040B9F666ED3F8732FD2125A1CF16
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon dcd4d4dcd4ece8dc (4 x AgentTesla, 4 x MassLogger, 1 x VIPKeylogger)
Reporter BastianHein
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
519
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
41b7489f2e1264bbd87ae07cfd6dfa9dba0a65f10035326ba2b361a11511f7eb
Verdict:
Malicious activity
Analysis date:
2025-01-31 01:25:38 UTC
Tags:
arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
shell lien msil sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
invalid-signature lolbin obfuscated packed packed packer_detected signed tracker
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1603544 Sample: Swift copy.exe Startdate: 31/01/2025 Architecture: WINDOWS Score: 100 35 mail.azmaplast.com 2->35 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 9 other signatures 2->53 8 Swift copy.exe 4 2->8         started        12 boqXv.exe 2 2->12         started        14 boqXv.exe 1 2->14         started        signatures3 process4 file5 31 C:\Users\user\AppData\...\Swift copy.exe.log, ASCII 8->31 dropped 55 Writes to foreign memory regions 8->55 57 Allocates memory in foreign processes 8->57 59 Adds a directory exclusion to Windows Defender 8->59 61 Injects a PE file into a foreign processes 8->61 16 RegSvcs.exe 1 4 8->16         started        21 powershell.exe 23 8->21         started        23 conhost.exe 12->23         started        25 conhost.exe 14->25         started        signatures6 process7 dnsIp8 33 mail.azmaplast.com 193.141.65.39, 49728, 587 KPNNL Iran (ISLAMIC Republic Of) 16->33 29 C:\Users\user\AppData\Roaming\...\boqXv.exe, PE32 16->29 dropped 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->37 39 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->39 41 Tries to steal Mail credentials (via file / registry access) 16->41 45 3 other signatures 16->45 43 Loading BitLocker PowerShell Module 21->43 27 conhost.exe 21->27         started        file9 signatures10 process11
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2025-01-30 11:00:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
56
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla unknown_loader_037
Similar samples:
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
b09aeec4d20cac35971b12067b6c91c2c2a4a72c004c374ece366345909de625
MD5 hash:
42027cc4a563a5ed356f303a0e9475e8
SHA1 hash:
f4052dfd8f00c31416ab0d0d9e638961519c8108
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
7e2e7cf85f0a5476331c3ba61d22838ffa5c7af4bd155e7d0f207e15175ba9b1
MD5 hash:
3b9addc45f5cf5006d96056abe12201a
SHA1 hash:
bec4df1939e8dc789095373621ea946853ba8758
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID Agenttesla_type2
Parent samples :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 hash:
ffb97d9798a95e8bf0762ef3261ec76c3d510e2e12fb1e53a433c184c02dbb10
MD5 hash:
0cfaf885e248d58f7b236e6efdf716d0
SHA1 hash:
b25d9f8855fc09d2aec9882e5d8605e28108eb43
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Parent samples :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 hash:
31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c
MD5 hash:
d5ee88c8a72921aa9dca20317ed1ef5e
SHA1 hash:
5d9a100342fe7383479829d2d24343ee735a1826
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments