MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | 4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d |
|---|---|
| SHA3-384 hash: | f62cf3e0732f0fe1320393362246d543160cca15d816333b4f93649c4daca5ba124ecca4d56367286a20f922b1462bc8 |
| SHA1 hash: | 1c1df763beab39b7cc6eb64daffc9012f6aff682 |
| MD5 hash: | 49aa9d40612155fbce090c6d75c1b271 |
| humanhash: | mobile-foxtrot-finch-seventeen |
| File name: | SecuriteInfo.com.Win32.PWSX-gen.1352.2615 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 731'136 bytes |
| First seen: | 2024-01-24 06:53:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:LPvcmMEvLsoKT/lk0gyMXCp4K8bCQR9dtZ9tGAKrWi0C0e:YUnKzsyMXCazR9dtZ9tNK90 |
| Threatray | 4'848 similar samples on MalwareBazaar |
| TLSH | T16BF4122233780F77DA9C453894B152654339EB4365A1E32E0DD974ACAFA2F854A373E3 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 58b4626ab6d880a8 (6 x AgentTesla, 1 x Formbook) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
f7e5bc980e9a7659ba8aedcb0e5ec208b13d807657ceaeb276db2f5ddeb0b2cf
4e531e34c8132457b497653d69f5efe16c95a651aa0a47e8ab8f56ad1f35b51d
052b4eda2c31d34095e1fc77adf582681b3659a77cfb5ed167af380d6f08d9db
f7cdedd0c2255acdeec852eac9d0f27167cc48eff1d92d34fe099f3c7f21ae9a
affaae9ae22127b74b0ff16f553a8de07baf4b4a72d4b179d5adf9775a65f4ff
135a046874c7621664f5259d83120e71c426fb40d54104a27a6fd25cb5d2f9c9
4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d
7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4
37b76e89fcb5bbc28f1984b6bdd58a16e034dc49357dbced7d2aa1a6a25daa17
cd5afb25fb90fab49b4623b7d2005004fabec7c32685c3ac056919e56aaed18c
089463f7438aada6e397465f3951fd3ac4b5cdae44e8e88e6bc7620005b2b418
32f09ba1f13e6344e1eee8a59c0111e01fa260fb003260e95e42d36c849894c9
4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d
f7431cb039b7b6deb859f5afd5c813fca0f9a1b47dbcb0cd7bba5ce3a9b754d9
042116c3502dddb64ef3b3cf600cb6488f4e928cc9ec95969a7314286e10a554
aa2a7a45f9361876ba300272fd6c98d32ccdf80927ad088cf114195afcfc78bd
b7bb528bfd86aea46c414f10f8463641a79e357b26d6b1b719d1e203bfa876ed
198596d17d62409a12b4f1f21e0a165774653713a4f9f5918ed710711b72573f
27769f4bb96d0e605bdc282658c6a729e4ceb8447cd9e1f9880c69862258e66f
f84f0208e1ccce6876611ab8d7e4c92f4e02427e9a72283f5346f98bf6539160
77a38968b37bcb562fb8df2e70f08d312cabcaaf5dca09e995ead70240a05a30
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.