MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4707037ad06f9050346dfc8046cbd3d55c93a16fa346d367caeb56068cdf0329. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 13
| SHA256 hash: | 4707037ad06f9050346dfc8046cbd3d55c93a16fa346d367caeb56068cdf0329 |
|---|---|
| SHA3-384 hash: | b5f9b1908d3de2a78984346c6cf06c588c3409daea3d56ec2753be236931c235b6788e32001d266285dc9553219221da |
| SHA1 hash: | dc74e8f7fe15ea3ef371b016aaee2fd79fccd2a6 |
| MD5 hash: | 273f9f3c5f9a4a97cdb40539636e2513 |
| humanhash: | fish-pennsylvania-friend-arizona |
| File name: | orden de compra T784984560898789790798.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'152'000 bytes |
| First seen: | 2024-04-03 12:57:30 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cc2b3e63a50ba98c3412285dee7a8f0b (16 x AgentTesla, 5 x RemcosRAT, 3 x 404Keylogger) |
| ssdeep | 24576:UqDEvCTbMWu7rQYlBQcBiT6rpFd+zbsR7:UTvC/MTQYxsWPkzbs |
| Threatray | 2'484 similar samples on MalwareBazaar |
| TLSH | T16F35BF0273C1D062FF9B92334F5AE6515BB87A260123E62F13981D7EBE701B1563E762 |
| TrID | 52.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 24.0% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 9.5% (.EXE) Win64 Executable (generic) (10523/12/4) 4.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.0% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Unpacked files
d6be3ce60c7585b89ff180e61027f1c0259975b5c4b3d315fc9a70ee46e5392e
4a0a4e9caa9ec0c910beb5023912bdc59e0d07d8a5d6162dd265740630d9268b
5769990f534b9e77b10af7b86276d41673e4e5e81ee2be5768f838e838299cff
e7236fe777e772afa5fe027e6013318ae8724059ee3d05101771d4528e7fc5b6
1d411c7bc92cb31171c0f02d34491ce6ee96eed6181e5cb075092209fdd60733
667ade680488ead36e7e6cd112f953212c964c0dcbef2fe88923811df818e161
1730345fea7a9812b05c73cc2fe4791597f87d7ed40018c127c94f7066173353
aa0d7a869139a6e9e4706324b519e9571241367507559f01ad6f9ddf4687693e
b909af5762d7adef435ec0cb9afd8752d171952dc796d9a7269d2b1838e31225
9fed1695a089e3f2a246b6f9f23f096deaab55b31e9a133db47dbdd83ca4f126
ca8157919b90d7a631653dacf8e1bf9e9f7330e4afedb2d0fb9154e405a8b415
4d32e2790a7a84c1cf62be213293d84087c4fa7cb53431da4a25d805f1827d12
6262a2af64ffe825409bcc421ee49d5059c119f31e1aecadeb54224d732b6f66
03b39b5ae27efd95eb42ff9fea9a9fbaf6a381d5a7c8cc34d12be9d6b06248c1
4707037ad06f9050346dfc8046cbd3d55c93a16fa346d367caeb56068cdf0329
3d79bf5d780b6770babf2f2cba5549a01992d4e77f797292e2f4a3ecd668379c
56dc031aa91579dc52c287554375c2cbea9aa02601ec4a50ecb3ad7af014dead
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.DLL::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.DLL::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::SetSystemPowerState KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::LoadLibraryW KERNEL32.DLL::LoadLibraryExW KERNEL32.DLL::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WriteConsoleW KERNEL32.DLL::ReadConsoleW KERNEL32.DLL::SetStdHandle KERNEL32.DLL::GetConsoleCP KERNEL32.DLL::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileExW KERNEL32.DLL::CopyFileW KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateHardLinkW KERNEL32.DLL::CreateFileW IPHLPAPI.DLL::IcmpCreateFile |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.DLL::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.