MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42bc1181234539298bb24048458ee5e99328127408b491d94688c8e012d0b64c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 42bc1181234539298bb24048458ee5e99328127408b491d94688c8e012d0b64c
SHA3-384 hash: 22f9d3119e7e42ea90116bede2dce960e36128f2465cc2237ee0854c35f7205900344f3434a6c5c4fcdf29fd9512e5a3
SHA1 hash: be8677d82968a34c99531f8d4a1c6ded9d84d1e2
MD5 hash: add90f640f9cc88b99aff3c43a21b5e9
humanhash: blue-winner-cold-thirteen
File name:Order_Nq22MNBNQ.pif
Download: download sample
Signature AgentTesla
File size:991'232 bytes
First seen:2021-03-15 13:32:00 UTC
Last seen:2021-03-15 15:38:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:CAYOVs4iLOrztkchniF0a2W2sjv1Le30btlEx3/uNOehKENcsl3Rj3VKs3w19KFw:CAHWgniFBEsjv9eO5MENcs1J3Vr3Tsg
Threatray 325 similar samples on MalwareBazaar
TLSH 5B256B203EA69034E432DAB75BD661B76D6D6F263B01F4F93E7173C60633943A9C1229
Reporter TeamDreier
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Order_Nq22MNBNQ.pif
Verdict:
No threats detected
Analysis date:
2021-03-15 13:35:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
.NET source code contains very large strings
Found malware configuration
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 368741 Sample: Order_Nq22MNBNQ.pif Startdate: 15/03/2021 Architecture: WINDOWS Score: 76 16 Found malware configuration 2->16 18 Yara detected AgentTesla 2->18 20 Yara detected AntiVM3 2->20 22 3 other signatures 2->22 6 Order_Nq22MNBNQ.exe 3 2->6         started        process3 process4 8 Order_Nq22MNBNQ.exe 6->8         started        10 Order_Nq22MNBNQ.exe 6->10         started        12 Order_Nq22MNBNQ.exe 6->12         started        14 2 other processes 6->14
Threat name:
ByteCode-MSIL.Trojan.Witch
Status:
Malicious
First seen:
2021-03-15 10:18:19 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
42bc1181234539298bb24048458ee5e99328127408b491d94688c8e012d0b64c
MD5 hash:
add90f640f9cc88b99aff3c43a21b5e9
SHA1 hash:
be8677d82968a34c99531f8d4a1c6ded9d84d1e2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments