MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 19


Intelligence 19 IOCs YARA 5 File information Comments

SHA256 hash: 38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106
SHA3-384 hash: 191d5100bf40ec17b03d3f4039ceda14729a741d9d9fa00bc286cc5d21216e8448f7dff672d6389478b4fcc4b6daee65
SHA1 hash: dea545e8b85f2c1201f7aa3a54f643826ca8a6ed
MD5 hash: 78eff09f295aa4b3aaf36af5245efe94
humanhash: robin-may-glucose-zebra
File name:FYCC new order S460013746-560121121.exe
Download: download sample
Signature AgentTesla
File size:942'592 bytes
First seen:2024-10-01 18:01:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:T3TEG/N9AKPGu+MAyn6+6Slh5/2qVe2lR8XaZW4IaBAP7r9r/+ppppppppppppp7:8AnAPRo6+pPOnoR8X2W4JBA1q
Threatray 2'303 similar samples on MalwareBazaar
TLSH T19815ADC0FA156714DD685B30963ACDB552623DBCB434B9AE29CD3F673BFE2526408B02
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon d4c4c4d8ccd4f0cc (241 x AgentTesla, 65 x Loki, 41 x Formbook)
Reporter cocaman
Tags:AgentTesla exe TNT

Intelligence


File Origin
# of uploads :
1
# of downloads :
451
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FYCC new order S460013746-560121121.tar
Verdict:
No threats detected
Analysis date:
2024-10-01 18:02:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Powershell Infosteal Joker
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523586 Sample: FYCC new order S460013746-5... Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 50 mail.iaa-airferight.com 2->50 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->58 60 14 other signatures 2->60 8 FYCC new order S460013746-560121121.exe 7 2->8         started        12 zriEHRxkd.exe 5 2->12         started        signatures3 process4 file5 42 C:\Users\user\AppData\Roaming\zriEHRxkd.exe, PE32 8->42 dropped 44 C:\Users\...\zriEHRxkd.exe:Zone.Identifier, ASCII 8->44 dropped 46 C:\Users\user\AppData\Local\...\tmpF74B.tmp, XML 8->46 dropped 48 FYCC new order S46...6-560121121.exe.log, ASCII 8->48 dropped 62 Adds a directory exclusion to Windows Defender 8->62 64 Injects a PE file into a foreign processes 8->64 14 FYCC new order S460013746-560121121.exe 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        66 Multi AV Scanner detection for dropped file 12->66 68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->68 70 Machine Learning detection for dropped file 12->70 24 zriEHRxkd.exe 12->24         started        26 schtasks.exe 12->26         started        28 zriEHRxkd.exe 12->28         started        30 2 other processes 12->30 signatures6 process7 dnsIp8 52 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->52 72 Loading BitLocker PowerShell Module 18->72 32 conhost.exe 18->32         started        34 WmiPrvSE.exe 18->34         started        36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        74 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->74 76 Tries to steal Mail credentials (via file / registry access) 24->76 78 Tries to harvest and steal ftp login credentials 24->78 80 Tries to harvest and steal browser information (history, passwords, etc) 24->80 40 conhost.exe 26->40         started        signatures9 process10
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-10-01 01:12:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
43
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
AgentTesla
Verdict:
Malicious
Tags:
agent_tesla
YARA:
n/a
Unpacked files
SH256 hash:
aee117ac2adf8df7a4d55d029a8180a2a095a0c5011963476e895fbd09e1e726
MD5 hash:
90c61e44935e1727ce5121932e3a9173
SHA1 hash:
9244bb2181b518e0c35f24bf226892beeabb96ee
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
d2174ddc2b6341b898b939fa0661d2a1cd8d485f5237427331f0d889672fbe7e
MD5 hash:
221f891053c35a694d7b442b7909d086
SHA1 hash:
81cb6829a184bae91927dc8b57744e895355b281
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Parent samples :
509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
7ef4c75ee4a5f3b7f2ac44323d9ba15bcd24f5d0b9e3e04dc330dc6cde421b7c
97fb0388618e3d977b390696f4ca19e38f0e706d70a40726bab9ed8dcdcd036c
6b8c990c92c37f014fc93efd79c6fbb3a22e8da7961e9333644bfeac353a2ae2
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65
72edec1131f38fb1e1753c90814de040ecf70515a270a1f1d3481c9194f6b949
9ca5a71321522f47140b36e5f1983cff7455dd124caa231d97df29cd654c6893
85e703636c2e5c837b37714c02a838dca4f2ac440d45c0bedfbf56b8e01c4820
c7ee9124f10a69564f9f096cc641aaf1c005a5270c8b62781ab71ced91a941d2
5ea66e4e338b5ded7b00ad1575010d7c1149341323a646069f3b00a518f300d5
c89c37f0b5dc89251da6c37aa8e1071c43d52c80fd2326f1e6de8dcd5eaf0dfc
c6ae41874ccd5d6c3e6da49cae6d0a0e8eee20e7037896b38f1e4523dd9543c8
08d86feee2707af5c57b4ffa8663c0e447c7425c39a103906cf15eae7cf1df9d
a433aa981a5cbfd5fae678c523b088d034f61f57dcb61232fbaba73657867b36
2095af004e76f0cf7243b68e868eeb3b9c8c157d632aa785a87a93addf3b75fc
9bcc5591013f066f47701388e95202aa53483c1b73321eecedafd30de2eb381e
822e06191849b35415693155a46edff39c41db14f3dce949120456c1b7b55892
79bcad797129c0be508de0fe7b0462b1aaffbafa74a4e7019a4561deb674f4bd
0dfe79bf85e9cfcbcd5ffa2cb21370eaf78d80d27ae4b4b0c5087afad5c6ebb8
156b1cea1a2f649e332be482047de3d368f5f7b7e93eb4821692ada17a69fc75
b31cbc6ec2eb2b790c422f0f960bb1436106d92958703cb005ccdef38887e310
c01d1b77062d28f497480aac1c2ad019d88b9f12a8db4405065cd2a9f3086191
362207c53645346df6f36cf3f7792e5fc4655895b35a6e3477e218e0e0007be9
3e26ebdfbd46dadcbf46c199970362689fa6ca0e0abb65ec703ca21d08b7269f
3279f79164633c0881c50971c98ca39bc9367111410f77582700468f2c0e3dd1
38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106
1897d47010a97079de62b957827fbecbdb4690ead4a51417fa6f1dccfc19f6c5
ece8d193afdcc6ec2c024e2441f7c0ce25801143573cacf71cf059de9a337275
b92304c2e680f54345fa77f77b0c507f93d05d43547e819d2ebf53a31e48ac97
f25dc80bfc742a0e8091d216ecbc033d93e71d43b31bbefb3ec9ef6cfc637cee
810430cb80a2b4d0cfb713a72dcb40c148f5494ae06b904ebe019e8f61b79d63
1cbf1a11cb59b7a4135093c3e6b11be6b81ba57fb30707de145a1d41506760a6
6841176c0e46732c3886f7908a5adf77a6d6ce1327268a9fcb7f2c0262132e41
d55b00b7cb5305371e1cc170179e7025cc517b810e57992adab16893b410985e
12af745dd8353b25857dc4bd3d3282f21c960ab55d3dece7e62d7a10a9aae810
60712b6d9bb023934b8d27fc6f54b3543a5ebfcd229cd1c4cb8f8dbaec08dc99
520fe428b0afdaf20673224c5004c004ab1d1dfd492cc54a37e362af8a844005
8f49d498d3ed3ff8f66d7f22a4ab6b7747e2e799662ee75b2019304e5dbc6dde
884c0261a0c4ff07790fa549a0dc1d752bd97ef3e0635536193c585a291a7281
368305c8a62f4edc3ab1b94d1242e5438b7d7c14a6c65f7beb4aad32b1984821
c387b91dd56a4b66da4582e26ebc0c5a473e37251fb44650fc62d6d4749d5c8c
27ff307b514230b2363e2284e1d57df50bc8a59b5cf8c732dc32d5587d472c64
407df9654a54792ee72730f5dae8bd303d7d92a24a5fe0a5bc83f634bab7a235
8b528f3a173e7e40394c21bb0cfa0304ef12b58ab185de1da8e4b4e5231eee8a
afef519b2380d9483a1b51eaccf235593140a75641e5a469d130f2d48ffd5268
a327355ae6e99929d1303a762ea8a936d8e4884f45d683de08dba6882c1c016d
ddad2801522370c2ca5c4ec41663b36a88ef6be171867f23f084c0fa6ecb1055
5a227bf354dbad129be8c6e1b82eca5bbe6f27587a522fd5fa9e30bdd61b8618
02abb1d01386d7d7ffd8debc2c0fb09baebb82d88b8f758e4de3f0deaaecfbf9
65b4919d036f5dc3a1dfe9b62510ed4e578a87dccf862df6fbb8524894c2965d
a77754ef6de4a61024e443178b88e50be8b1994f87b323ed7fa5f2f197acdab4
780354ea81fa066b085767d98d878a9b891f7febea281d2e09577b424a6ab47d
b9f4537fa4b470f09cc62c1c706004604498c9405e638712eb4f2ea6a6b1876d
4ed81a9a25e52a99d76805b081679cfe3628756be4bda6a47e365506c7df3a0c
3376b495c19dc3e179dfb2ef072a362c2d26ed59b06266dd7dbf080a80a005f6
0ad205b2d883bca56250246f308228379c27f6114d8b740014deeef53b3412bb
01ab4d20ae687b065b10fdf3f3243a46a320dcec4b3a9a8e0cafcc0878aa1800
bf4ab91b352744a5ac16ef96f4c25405b993ded0aeaed9c09efbddab513877b9
b1fb20d5857d1ca65dbacd6cb100dc2d7da8eb7ce54d4faeebafb2bbb212beca
03b5cfab3f0ffdf96e415006004be9a0c05e6365e1d5834984cfd5cea9df85fe
3d4bfc47bd88ef39e0780482a1b0fde1cd85772ddce25d9905d88d48b5b96a4a
e407720bcc7f5845bb9cf84c1c1209ef6e2afd339518359f86944c5f6e019b09
e7fc9e51d81f4b40dca80a3d83ca54a03120566b6dd6f76e0299546ac178f633
20f9d4cf5cd85fa7cf0d58b55409f75f9af0b952d3b573bffdd21966d9a3f396
SH256 hash:
acff54dc41a4f979a5054bc43649e097472904293fa9c4d23048b30a57bc3149
MD5 hash:
8234c3ec3aba620ca36e9d5629e3db74
SHA1 hash:
09d5b639a270fb4cbf45b2b454db96cc1035a768
Detections:
AgentTesla win_agent_tesla_g2 Agenttesla_type2
Parent samples :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 hash:
38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106
MD5 hash:
78eff09f295aa4b3aaf36af5245efe94
SHA1 hash:
dea545e8b85f2c1201f7aa3a54f643826ca8a6ed
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments