MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 433327373b99264a0a5f11194a3722e1a53c832e837f0eab264f89306f9e42cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 18 File information Comments

SHA256 hash: 433327373b99264a0a5f11194a3722e1a53c832e837f0eab264f89306f9e42cb
SHA3-384 hash: 83d07d9a5c5a9003e0bd4f9b964e7f55be98b54a763ccefc3daf7932644d40d56efd4adac5a562282209547a4d812a60
SHA1 hash: 32dd5b42cc297a15a97b40a3b06a1842d52466a7
MD5 hash: eb0a8ca9351d89d49548bc4060db555b
humanhash: pennsylvania-twenty-july-oscar
File name:SecuriteInfo.com.Win32.PWSX-gen.16177.2093
Download: download sample
Signature AgentTesla
File size:712'192 bytes
First seen:2024-04-29 07:37:34 UTC
Last seen:2024-04-29 12:38:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:o+DbgSB778Qe/FsDEhr/S+dCQGXErlP7lo3JwdTOg5nACS5YOnm3xG1nEniA:JgSBYdCkllWuUp/n2EnEniA
Threatray 995 similar samples on MalwareBazaar
TLSH T16FE40241A2EC9F77DB7ACBF8852598840BF778A65862E2481DD375CF2972F408610F27
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
353
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
433327373b99264a0a5f11194a3722e1a53c832e837f0eab264f89306f9e42cb.exe
Verdict:
Malicious activity
Analysis date:
2024-04-29 07:39:27 UTC
Tags:
smtp agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Sending an HTTP GET request
Setting a keyboard event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd lolbin masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1433142 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 29/04/2024 Architecture: WINDOWS Score: 100 61 mail.starmech.net 2->61 63 api.ipify.org 2->63 69 Found malware configuration 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 Sigma detected: Scheduled temp file as task from temp location 2->73 75 11 other signatures 2->75 8 SecuriteInfo.com.Win32.PWSX-gen.16177.2093.exe 7 2->8         started        12 TrQrGQkCIJJZ.exe 5 2->12         started        14 BjTxJte.exe 2->14         started        16 BjTxJte.exe 2->16         started        signatures3 process4 file5 57 C:\Users\user\AppData\...\TrQrGQkCIJJZ.exe, PE32 8->57 dropped 59 C:\Users\user\AppData\Local\...\tmp5E40.tmp, XML 8->59 dropped 91 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 8->93 95 Adds a directory exclusion to Windows Defender 8->95 18 SecuriteInfo.com.Win32.PWSX-gen.16177.2093.exe 16 5 8->18         started        23 powershell.exe 23 8->23         started        35 2 other processes 8->35 97 Multi AV Scanner detection for dropped file 12->97 99 Machine Learning detection for dropped file 12->99 101 Injects a PE file into a foreign processes 12->101 25 TrQrGQkCIJJZ.exe 12->25         started        37 2 other processes 12->37 27 BjTxJte.exe 14->27         started        29 schtasks.exe 14->29         started        31 BjTxJte.exe 16->31         started        33 schtasks.exe 16->33         started        signatures6 process7 dnsIp8 65 mail.starmech.net 207.174.215.249, 49734, 49738, 49743 PUBLIC-DOMAIN-REGISTRYUS United States 18->65 67 api.ipify.org 172.67.74.152, 443, 49733, 49737 CLOUDFLARENETUS United States 18->67 53 C:\Users\user\AppData\Roaming\...\BjTxJte.exe, PE32 18->53 dropped 55 C:\Users\user\...\BjTxJte.exe:Zone.Identifier, ASCII 18->55 dropped 77 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->77 79 Tries to steal Mail credentials (via file / registry access) 18->79 81 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->81 83 Loading BitLocker PowerShell Module 23->83 39 conhost.exe 23->39         started        41 WmiPrvSE.exe 23->41         started        43 conhost.exe 29->43         started        85 Tries to harvest and steal ftp login credentials 31->85 87 Tries to harvest and steal browser information (history, passwords, etc) 31->87 89 Installs a global keyboard hook 31->89 45 conhost.exe 33->45         started        47 conhost.exe 35->47         started        49 conhost.exe 35->49         started        51 conhost.exe 37->51         started        file9 signatures10 process11
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2024-04-29 06:22:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
ab737fa94d5638dc23955700ae5443fa7a05882c821c51b995935a91e42c3561
MD5 hash:
8ae00a26ba2f9f1d519fd6455db2cb4d
SHA1 hash:
9270d95cc7f7a8d1915de694d54a550b3c683684
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
0bfb0358d9cd73716bbdd5e02dc6d9ad4ff7ce928bb149834844b4e8eb8ce74b
MD5 hash:
4b113a772f878eb4bcf3e345fbef0d6c
SHA1 hash:
21df75ac80bb07e3ee7c8d93ed756c6059a50448
SH256 hash:
d2d7bc189395f20a8044e87191e959c245364ad9b93232a43f4465f0da69915f
MD5 hash:
e794fefa716fa72fd5f2521c5346bdc1
SHA1 hash:
0cd5abb58edc3bf2eb26ac7c37cd28a0ff88a72d
SH256 hash:
8213a6a34c36db37675298dcbbbb36451ddf233c1af7e8783be225d3e4c08271
MD5 hash:
a2f5dafc17432fdea2f85c9c972167ca
SHA1 hash:
004139faa5268e3fd9fcc92710d0e331d32a2d7b
SH256 hash:
433327373b99264a0a5f11194a3722e1a53c832e837f0eab264f89306f9e42cb
MD5 hash:
eb0a8ca9351d89d49548bc4060db555b
SHA1 hash:
32dd5b42cc297a15a97b40a3b06a1842d52466a7
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Generic_Threat_9f4a80b2
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 433327373b99264a0a5f11194a3722e1a53c832e837f0eab264f89306f9e42cb

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments