MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41857a1bfb1cda7337d39a4c6bcec253fb44532179f9cb12e919608f227e3dcb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 41857a1bfb1cda7337d39a4c6bcec253fb44532179f9cb12e919608f227e3dcb
SHA3-384 hash: 57d3ddff5250623f2cb8bf27d69bd4ddffa2d43c6f4e1e9c795cd3352a158df1014f3028fab9f2e71e79eac4528caa44
SHA1 hash: 242fab27bf359d76f1a2778f631a07bb32d75cb5
MD5 hash: b08ab9e9f0ef2e9be2d7137a45c61c19
humanhash: venus-apart-mountain-quebec
File name:SHIPPING DOCUMENTS.exe
Download: download sample
Signature AgentTesla
File size:564'224 bytes
First seen:2023-02-04 00:25:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'601 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:NpYxjqGYv6GaG4YPwZrcOqQNxOUIvl7cE3UkfaP0or8z9i7+pvdCWtO:5/W3YPwJcaxKB1faP0or8zw6Rsh
TLSH T1CEC4230C93BD16BFD32E81FF426FC5A0977469193283E78A5E7500F92347B866710AE6
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00c8dcfc9cdcd000 (13 x Loki, 13 x AgentTesla, 11 x Formbook)
Reporter Anonymous
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SHIPPING DOCUMENTS.exe
Verdict:
Malicious activity
Analysis date:
2023-02-04 00:25:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Creating a process from a recently created file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 798371 Sample: SHIPPING DOCUMENTS.exe Startdate: 04/02/2023 Architecture: WINDOWS Score: 100 76 Malicious sample detected (through community Yara rule) 2->76 78 Sigma detected: Scheduled temp file as task from temp location 2->78 80 Multi AV Scanner detection for submitted file 2->80 82 11 other signatures 2->82 7 SHIPPING DOCUMENTS.exe 7 2->7         started        11 ixFLYWjJ.exe 5 2->11         started        13 lWmOHpD.exe 2->13         started        15 lWmOHpD.exe 2->15         started        process3 file4 54 C:\Users\user\AppData\Roaming\ixFLYWjJ.exe, PE32 7->54 dropped 56 C:\Users\...\ixFLYWjJ.exe:Zone.Identifier, ASCII 7->56 dropped 58 C:\Users\user\AppData\Local\...\tmp8122.tmp, XML 7->58 dropped 60 C:\Users\user\...\SHIPPING DOCUMENTS.exe.log, ASCII 7->60 dropped 92 Adds a directory exclusion to Windows Defender 7->92 94 Injects a PE file into a foreign processes 7->94 17 SHIPPING DOCUMENTS.exe 17 10 7->17         started        22 powershell.exe 21 7->22         started        34 2 other processes 7->34 96 Multi AV Scanner detection for dropped file 11->96 98 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->98 100 May check the online IP address of the machine 11->100 24 ixFLYWjJ.exe 11->24         started        26 schtasks.exe 11->26         started        102 Machine Learning detection for dropped file 13->102 104 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 13->104 28 lWmOHpD.exe 13->28         started        36 2 other processes 13->36 30 lWmOHpD.exe 15->30         started        32 schtasks.exe 15->32         started        signatures5 process6 dnsIp7 62 api4.ipify.org 64.185.227.155, 443, 49699, 49703 WEBNXUS United States 17->62 64 gupbd.org 23.29.115.3, 49700, 49701, 49705 INCERO-HVVCUS United States 17->64 68 3 other IPs or domains 17->68 50 C:\Users\user\AppData\Roaming\...\lWmOHpD.exe, PE32 17->50 dropped 52 C:\Users\user\...\lWmOHpD.exe:Zone.Identifier, ASCII 17->52 dropped 84 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->84 86 Tries to steal Mail credentials (via file / registry access) 17->86 88 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->88 38 conhost.exe 22->38         started        66 104.237.62.211, 443, 49702, 49704 WEBNXUS United States 24->66 70 2 other IPs or domains 24->70 40 conhost.exe 26->40         started        72 2 other IPs or domains 28->72 74 2 other IPs or domains 30->74 90 Tries to harvest and steal browser information (history, passwords, etc) 30->90 42 conhost.exe 32->42         started        44 conhost.exe 34->44         started        46 conhost.exe 34->46         started        48 conhost.exe 36->48         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-31 14:10:54 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
178cc7474b323b0ae6b3095ff67127726530d9d44be5cb58ba7315ef3a1199ad
MD5 hash:
159af9cf7f94d64c8120c80268965306
SHA1 hash:
fb41ab37af2c83e96d97e9cd066f90e72d4887ea
SH256 hash:
6a7facc25da613ad069428106778cc2c887b4606d6c31c345cf5f0efcb845ccb
MD5 hash:
3a927f9e235842be773c71f2f35cb167
SHA1 hash:
b7ee95b9dc573361a540443c7e15ffb50bde60f5
SH256 hash:
4a2718faf56507db4934acd5e1343730447eae70236c0e6ad5c51b95825c875f
MD5 hash:
39a3c30cdaf6a8021a94f07e4f5dd6c5
SHA1 hash:
ad59b550efd5adfb0805c9b6e91b3ec59e577fc8
SH256 hash:
7fe41e87e964f6f3a2ccce7f8f07f0db32f056fc377896268047e3b125c10207
MD5 hash:
d5d4b966a9bbaddd27450800d70c984a
SHA1 hash:
8b72e633cc6b5ee1737159153832d5773f579621
SH256 hash:
1502e59b8309cf7c416d90b3520272e2e0cae76d96531a0ed794515767b0a11f
MD5 hash:
23269f51022c85b7c4d0f7576214016d
SHA1 hash:
34ae1ac3c2157eea2deb868c263d7c71dd244b4a
SH256 hash:
41857a1bfb1cda7337d39a4c6bcec253fb44532179f9cb12e919608f227e3dcb
MD5 hash:
b08ab9e9f0ef2e9be2d7137a45c61c19
SHA1 hash:
242fab27bf359d76f1a2778f631a07bb32d75cb5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 41857a1bfb1cda7337d39a4c6bcec253fb44532179f9cb12e919608f227e3dcb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments