MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3ea5fdf1bf1d8ef3f91cfea53101058524ca73287a6695993b6fce1fd9ad7c84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 3ea5fdf1bf1d8ef3f91cfea53101058524ca73287a6695993b6fce1fd9ad7c84 |
|---|---|
| SHA3-384 hash: | 40e71878d2eb83f38e8b8d7776ea48ffdb37fae2eb6c239d103ff1f366ed86e0992b896c18323fd51d872c0294566043 |
| SHA1 hash: | a443677c61a9b734aaf4f63c52699a497ca65026 |
| MD5 hash: | 0c9618708ec0e75d83db35183198208d |
| humanhash: | fix-autumn-orange-arkansas |
| File name: | Quotation 0048484.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 740'864 bytes |
| First seen: | 2024-04-17 04:18:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:8GL21ILNYV12cWjoIXW/eJhuRPyZSXKkHUBO2vyUhED3lI5jCTG1Z6q:FL21IL6V1rAXWmJhi6ZS7+ylDVM/ |
| TLSH | T171F42396FA9C372BC5AADAF31221A63007F6A1451630DBCF0DC2E6E92BE77407151727 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.