MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 39a8f452064a1daeeee2af8e3f411877851c07c13cb1a41a0e08d9b04c2525fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 39a8f452064a1daeeee2af8e3f411877851c07c13cb1a41a0e08d9b04c2525fd |
|---|---|
| SHA3-384 hash: | 280e4386d618e0f98008f1072443bfc2f6f58910dbcf43325a1521b452b903aa6fef78766475cbd535610d892ec11022 |
| SHA1 hash: | 4560996ecf46c1ab377cb6c22ab88ac8b5d4460a |
| MD5 hash: | c72f0ad725a9b8407eb76afd7020ece4 |
| humanhash: | six-eighteen-juliet-thirteen |
| File name: | c72f0ad725a9b8407eb76afd7020ece4 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 777'728 bytes |
| First seen: | 2023-12-20 05:55:20 UTC |
| Last seen: | 2023-12-20 07:15:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:GBXzXPe3MuKUz6i7D814km4GMhQ9X68EEelKh+DkYo1cMDoscx1z80Z94:2XzXu357DnAGM0X68ElDQi8W94 |
| Threatray | 419 similar samples on MalwareBazaar |
| TLSH | T117F4021397EEAEB3C57D1B7A0442759433F0D0860522FB6B2CD990F85D9ABD5CF81A22 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | 32 AgentTesla exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
340
Origin country :
FRVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PI.xls
Verdict:
Malicious activity
Analysis date:
2023-12-19 15:13:34 UTC
Tags:
phishing phishing-xls opendir loader exploit cve-2017-11882
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTesla
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching a process
Searching for the window
Creating a window
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
obfuscated packed
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla, DarkTortilla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Detection:
agenttesla
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-19 07:22:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
35
AV detection:
18 of 23 (78.26%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 409 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
56aaa2b9e53d69dd75c8d1247220d8ea97b1b7705796b2e2ddff34c7eea8adee
MD5 hash:
50f28d178452b2db4e1f466904e55c78
SHA1 hash:
d9a3246a570715d756a6c653b6818afb99ae39ec
SH256 hash:
0781f74db6c9ff7aa0c1e76dd0ebc4a9575fba6caca9aac9fb0131c5a73c84be
MD5 hash:
2c064163cda2f093cf6d20302481dff7
SHA1 hash:
cf948b10d999c369ef51972f86278a4f536d400d
SH256 hash:
e298d9ca75d9629b37987c55c9ca3535651deb4d2d73df19c2a7d55e63cf6b95
MD5 hash:
912a6432e88b949b5995d07622e07561
SHA1 hash:
c6b229f2871cf8ad6ec490119297c78007d055b4
Detections:
AgentTeslaXorStringsNet
MSIL_SUSP_OBFUSC_XorStringsNet
INDICATOR_EXE_Packed_GEN01
Parent samples :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 hash:
2db82e9b91b1ccb1957b4e06ec49bfb0096e973213fc1786de1bbe3162f5df5a
MD5 hash:
27dea42a70bd7e948f1171ce873878a1
SHA1 hash:
b87051d51479c093cdf3e721acea4fd8b940b1e5
SH256 hash:
39a8f452064a1daeeee2af8e3f411877851c07c13cb1a41a0e08d9b04c2525fd
MD5 hash:
c72f0ad725a9b8407eb76afd7020ece4
SHA1 hash:
4560996ecf46c1ab377cb6c22ab88ac8b5d4460a
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://192.3.179.162/2547/wlanext.exe