MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d89d938245c8482b052606671e22041cae0ca7b12bb59214726b9dedb59f3a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 3d89d938245c8482b052606671e22041cae0ca7b12bb59214726b9dedb59f3a1
SHA3-384 hash: b91a4e9fe101d7ff1158894cc0c356a531f053038ecd46cebe533dd9ca210439c9379bb1af81b92f3397b7c3625fd6ea
SHA1 hash: a18d33220a14e61828428a12d4b4d5e0db949a30
MD5 hash: b4d523a83a5b9e73665ca3a458760bdd
humanhash: comet-black-florida-summer
File name:shipping order.exe
Download: download sample
Signature AgentTesla
File size:274'410 bytes
First seen:2023-03-06 11:04:15 UTC
Last seen:2023-03-06 19:01:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 6144:PYa6gfMuzofCsGNOOqvVXKMk6ZPt8TQ6X2jl1vJgNb10UGvoF:PY2ftodGcOmwM/GTQhPvJ01cQF
Threatray 1'987 similar samples on MalwareBazaar
TLSH T1D84412147E94E457F8F11B30ED7A2B660EF6A11104A7A31F17A0DA4DBA33671CA0A792
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter cocaman
Tags:AgentTesla exe Shipping

Intelligence


File Origin
# of uploads :
9
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
shipping order.exe
Verdict:
Malicious activity
Analysis date:
2023-03-06 11:05:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Сreating synchronization primitives
DNS request
Reading critical registry keys
Sending an HTTP GET request
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2023-03-06 09:48:32 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
31c6a83f499cc6070e9e685c6353f280df9880323972a958d68274759d7a7f34
MD5 hash:
25a4cc4ee4de28cf0bf56b1c2789de89
SHA1 hash:
1b6ce6d9665e8dc7ca0d63153611c63b7883a302
SH256 hash:
8a208701b3bfd6a73f8531c4a7aed1c211988ba1caf50157180213ef48420f65
MD5 hash:
ec8215a021495f97d2c28a1cb01037dd
SHA1 hash:
e8f191297ab2e0f3791e379ddbb985110264e2cf
SH256 hash:
e5da5f71478cc1bb91fa181aa746a84a3ac8551f1ad67bf612167cd3a5bfb262
MD5 hash:
5a18174406cde54e1b01b24d8ac66389
SHA1 hash:
ac39bf449376579eed053249d1e78def85350bff
SH256 hash:
b6749e0e924704ca60c61b69be8b2dc4ab9037283cb3b4ddc34dc0ad985cd3db
MD5 hash:
fb23420218d6f728309a6d17a2dac986
SHA1 hash:
7f1dcebf424ae86fa44ee1c3c94908f9355b513e
SH256 hash:
648934e50fdea05f8b16b177a0be21718c455f5847f4296e2886c52061bee67c
MD5 hash:
e898f5574cb43d58f955390f86ab3e9b
SHA1 hash:
4833a6578c49b041afe9b9302f649fda4d419159
SH256 hash:
4da680f0fe9fdea499c769bc86efeb7bc4efeb60b46ef3455928b73ae5c615bb
MD5 hash:
2778303cc2d9b793eb92cdc72b36186f
SHA1 hash:
e1f41671935c8a4f1f0fd4cd301cfc17d30ee885
SH256 hash:
3d89d938245c8482b052606671e22041cae0ca7b12bb59214726b9dedb59f3a1
MD5 hash:
b4d523a83a5b9e73665ca3a458760bdd
SHA1 hash:
a18d33220a14e61828428a12d4b4d5e0db949a30
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pe_imphash
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 3d89d938245c8482b052606671e22041cae0ca7b12bb59214726b9dedb59f3a1

(this sample)

Comments