MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e61d72e8e7853b7c4a966cdee9339bfe33b7ae33577c408cdfbca1d951335b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 3e61d72e8e7853b7c4a966cdee9339bfe33b7ae33577c408cdfbca1d951335b9
SHA3-384 hash: c6521c1d804461d53378f6be7a838a5a731f4cfc69e54b29a793f84fadd8b9b934fe4a6af79acbb39d011a15a4e56f65
SHA1 hash: 9923d54f028d36bb3c4129e6bb4e09c9cabea7b3
MD5 hash: d08ef01384d580a84fbde4a6df347e06
humanhash: purple-eleven-south-venus
File name:Madinat Jumeirah Living Asayel 14782(480).exe
Download: download sample
Signature AgentTesla
File size:466'255 bytes
First seen:2023-01-12 07:24:22 UTC
Last seen:2023-01-12 08:38:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 6144:QYa6xUfZo8O6+a2rFIBIkAmscTEz4OCPz2X9oqU+nf4NdzpaMjBip3o3Vm:QYeoo+PGTAiAXD9oUgZVjMp3o3Vm
Threatray 25'829 similar samples on MalwareBazaar
TLSH T11AA40104B1B9C442CADBB2388F95D5B907ADAE1DA464574B13F07F4B79BF283A80D360
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter cocaman
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Madinat Jumeirah Living Asayel 14782(480).exe
Verdict:
Malicious activity
Analysis date:
2023-01-12 07:25:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Reading critical registry keys
Сreating synchronization primitives
DNS request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Detected unpacking (creates a PE file in dynamic memory)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-01-12 04:44:54 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection spyware stealer
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
87c6f5a302e66a719d00fbdf7ee91e680809f9c59db07ad5123cd6731d56901d
MD5 hash:
ccbcc3c3037c9cd710c99aad5c214d1b
SHA1 hash:
a2df277bd77dfa9138fce38f064fe0827c824697
SH256 hash:
cbe8a4e75c7b4cdc61045854c3226ac677782c7871b2818ebba80e1fc27f151f
MD5 hash:
d1cb580cf579764056d29ec4718dfdee
SHA1 hash:
52c5d1650f624ed83d364a2717aa9fb70052d2e3
SH256 hash:
cf2b9c4b4c3d6dbb0b1411dc4f118ab1f4793c92681cce7eab9c55f02eceef79
MD5 hash:
fa87fc8cceecdc4946a3de031d31464f
SHA1 hash:
3f57285ce8d55c132b2cc30e8b1b8a32dccfead2
SH256 hash:
3e61d72e8e7853b7c4a966cdee9339bfe33b7ae33577c408cdfbca1d951335b9
MD5 hash:
d08ef01384d580a84fbde4a6df347e06
SHA1 hash:
9923d54f028d36bb3c4129e6bb4e09c9cabea7b3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 3e61d72e8e7853b7c4a966cdee9339bfe33b7ae33577c408cdfbca1d951335b9

(this sample)

Comments