MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 418f0f099c70fa88460becd3b8d10992f68dacf4dba44370abdde90292d508d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 16 File information Comments

SHA256 hash: 418f0f099c70fa88460becd3b8d10992f68dacf4dba44370abdde90292d508d6
SHA3-384 hash: 0130752bc8efcdc697288716215eb49f0f1e0ee8d601062c2d32b22dce0498936d562422198795a7633e97ec46ca5677
SHA1 hash: e1e517d689d06c48f592a7f212fba3767f6ea7fb
MD5 hash: 84c032bd2c199ec3b9190a3ba3a79688
humanhash: green-magnesium-kansas-alpha
File name:RADOSS - PO.pdf.exe
Download: download sample
Signature AgentTesla
File size:811'008 bytes
First seen:2024-05-02 06:11:04 UTC
Last seen:2024-05-02 06:26:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 24576:pyMtlKi5sGLp4kdK16fgSZE+iKtkVrWW:dt4GWk016fgN+pkdW
Threatray 865 similar samples on MalwareBazaar
TLSH T19705D0AC365079EFC85BCE72D9942C74AA606467530BE247AC1725EC9D4E9CBCF180F2
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 70cccc9696cccc70 (15 x AgentTesla, 1 x PureLogsStealer, 1 x Neshta)
Reporter cocaman
Tags:AgentTesla exe


Avatar
cocaman
Malicious email (T1566.001)
From: "Farah <ranjana.rai@suryalife.com>" (likely spoofed)
Received: "from suryalife.com (unknown [185.222.58.88]) "
Date: "2 May 2024 00:27:17 +0200"
Subject: "Re: radoss/2024-01/565/R4 POS"
Attachment: "RADOSS - PO.pdf.exe"

Intelligence


File Origin
# of uploads :
2
# of downloads :
303
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
418f0f099c70fa88460becd3b8d10992f68dacf4dba44370abdde90292d508d6.exe
Verdict:
Malicious activity
Analysis date:
2024-05-02 06:13:18 UTC
Tags:
smtp exfiltration stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Reading critical registry keys
Sending an HTTP GET request
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435155 Sample: RADOSS - PO.pdf.exe Startdate: 02/05/2024 Architecture: WINDOWS Score: 100 42 mail.interveinlab.com 2->42 44 interveinlab.com 2->44 46 api.ipify.org 2->46 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 58 15 other signatures 2->58 8 pUqBBEOXo.exe 4 2->8         started        11 RADOSS - PO.pdf.exe 7 2->11         started        signatures3 process4 file5 60 Multi AV Scanner detection for dropped file 8->60 62 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->62 64 Machine Learning detection for dropped file 8->64 14 pUqBBEOXo.exe 8->14         started        17 schtasks.exe 8->17         started        38 C:\Users\user\AppData\Roaming\pUqBBEOXo.exe, PE32 11->38 dropped 40 C:\Users\user\AppData\Local\...\tmpD371.tmp, XML 11->40 dropped 66 Adds a directory exclusion to Windows Defender 11->66 19 RADOSS - PO.pdf.exe 15 2 11->19         started        22 powershell.exe 23 11->22         started        24 powershell.exe 23 11->24         started        26 schtasks.exe 1 11->26         started        signatures6 process7 dnsIp8 68 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->68 70 Tries to steal Mail credentials (via file / registry access) 14->70 72 Tries to harvest and steal ftp login credentials 14->72 74 Tries to harvest and steal browser information (history, passwords, etc) 14->74 28 conhost.exe 17->28         started        48 interveinlab.com 199.102.224.68, 49714, 49719, 587 LEASEWEB-USA-WDCUS United States 19->48 50 api.ipify.org 104.26.12.205, 443, 49712, 49718 CLOUDFLARENETUS United States 19->50 76 Loading BitLocker PowerShell Module 22->76 30 conhost.exe 22->30         started        32 WmiPrvSE.exe 22->32         started        34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2024-05-01 12:43:21 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
18 of 23 (78.26%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
da2bccd26382a7f85a931e427728ff2288011bbb765d8304f2d7b104f317a6b0
MD5 hash:
1d941feb1b2fdb72d339d286e4b51add
SHA1 hash:
63c41f8d6429101248f808111c506632d441541c
SH256 hash:
730d20d7e5e757e99a45b93fadd70c8553a8ae7d7eb8ea10aacb2daf0675dbb9
MD5 hash:
308c4e14221c10ffd9b19b4adb2c39d0
SHA1 hash:
47333f54d93f99f7fea55ab84dce316a108ef21f
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :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 hash:
82ce5125e7ddf9973e5fa1e06dc018519735dca288aefb4b9caed0caac6ca78b
MD5 hash:
392bce70b0e90b5d3a78029f7a883e01
SHA1 hash:
1ee522beb74ae90400569dc0fd9d8532ee0a8a1d
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
8213a6a34c36db37675298dcbbbb36451ddf233c1af7e8783be225d3e4c08271
MD5 hash:
a2f5dafc17432fdea2f85c9c972167ca
SHA1 hash:
004139faa5268e3fd9fcc92710d0e331d32a2d7b
SH256 hash:
418f0f099c70fa88460becd3b8d10992f68dacf4dba44370abdde90292d508d6
MD5 hash:
84c032bd2c199ec3b9190a3ba3a79688
SHA1 hash:
e1e517d689d06c48f592a7f212fba3767f6ea7fb
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Generic_Threat_9f4a80b2
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 418f0f099c70fa88460becd3b8d10992f68dacf4dba44370abdde90292d508d6

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments