MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a117183745224765eb2d50d5fc3da43bb44bf0b94bf32be6c3f418c8abde716. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 3a117183745224765eb2d50d5fc3da43bb44bf0b94bf32be6c3f418c8abde716
SHA3-384 hash: 41ced16e03653572f3a44c65f6ce91fdf59c08deee578349df9dbed4321c2082540b8e0b43235bf9dfc96b54f5c5e0b6
SHA1 hash: 3b777782babcfc9ce26258313e3969896c9dc486
MD5 hash: 3cd15a597bce686b6fa8b378e3422839
humanhash: pasta-delaware-vermont-hamper
File name:IMG_003062130pdf.exe
Download: download sample
Signature AgentTesla
File size:339'357 bytes
First seen:2024-02-14 12:54:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f4639a0b3116c2cfc71144b88a929cfd (96 x GuLoader, 53 x Formbook, 37 x VIPKeylogger)
ssdeep 6144:vfL+oqWgmCRd3KxnEO1kD7iXrSV9U225OWH43ufEwtp1kd1Ka:vfLoYEO1WclY+fBU1Ka
TLSH T167740151E3A8BEAFC45703B509391B0265AABD199DB0020E2759F9257CF33737A6BD02
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon dcdc888898ac9cb8 (11 x AgentTesla, 1 x Loki, 1 x DarkCloud)
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
306
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Unauthorized injection to a recently created process
Forced shutdown of a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the user root directory
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Powershell dedcode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1392123 Sample: IMG_003062130pdf.exe Startdate: 14/02/2024 Architecture: WINDOWS Score: 100 42 server1.marfinllc.shop 2->42 44 api.ipify.org 2->44 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus detection for URL or domain 2->62 64 8 other signatures 2->64 9 IMG_003062130pdf.exe 8 2->9         started        13 zttres.exe 2->13         started        signatures3 process4 file5 38 C:\Users\user\zttres.exe, PE32 9->38 dropped 72 Drops PE files to the user root directory 9->72 15 zttres.exe 2 9->15         started        19 powershell.exe 13->19         started        signatures6 process7 file8 40 C:\Users\user\temp_.ps1, ASCII 15->40 dropped 52 Multi AV Scanner detection for dropped file 15->52 54 Machine Learning detection for dropped file 15->54 56 Bypasses PowerShell execution policy 15->56 21 powershell.exe 17 15->21         started        24 vbc.exe 2 19->24         started        28 conhost.exe 19->28         started        signatures9 process10 dnsIp11 36 C:\Users\user\AppData\Roaming\...\zttres.lnk, MS 21->36 dropped 30 vbc.exe 15 2 21->30         started        34 conhost.exe 21->34         started        46 104.26.12.205, 443, 49722 CLOUDFLARENETUS United States 24->46 66 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->66 68 Tries to steal Mail credentials (via file / registry access) 24->68 70 Tries to harvest and steal browser information (history, passwords, etc) 24->70 file12 signatures13 process14 dnsIp15 48 server1.marfinllc.shop 66.29.151.236, 49719, 49723, 587 ADVANTAGECOMUS United States 30->48 50 api.ipify.org 172.67.74.152, 443, 49718 CLOUDFLARENETUS United States 30->50 74 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 30->74 76 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 30->76 78 Tries to steal Mail credentials (via file / registry access) 30->78 signatures16
Threat name:
ByteCode-MSIL.Trojan.AsyncRAT
Status:
Malicious
First seen:
2024-02-13 07:14:48 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Uses the VBS compiler for execution
AgentTesla
Unpacked files
SH256 hash:
b93e104615376c3658caa5bf386ae9c38b287754a5c22bd8aa1c292ff9c8827c
MD5 hash:
74b9f58725963a11be59108efb2a9620
SHA1 hash:
87459af592cac5ca9ebf817e544f3db6f84f1fd2
SH256 hash:
3a117183745224765eb2d50d5fc3da43bb44bf0b94bf32be6c3f418c8abde716
MD5 hash:
3cd15a597bce686b6fa8b378e3422839
SHA1 hash:
3b777782babcfc9ce26258313e3969896c9dc486
Detections:
SUSP_NullSoftInst_Combo_Oct20_1
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_NullSoftInst_Combo_Oct20_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious NullSoft Installer combination with common Copyright strings
Reference:https://twitter.com/malwrhunterteam/status/1313023627177193472

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 3a117183745224765eb2d50d5fc3da43bb44bf0b94bf32be6c3f418c8abde716

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments