MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48ae64ee3a74c4d134f8c6542d9374325cfd89430d27dd810d3fe0f4961d105e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 48ae64ee3a74c4d134f8c6542d9374325cfd89430d27dd810d3fe0f4961d105e
SHA3-384 hash: 0456ced85a9d49d747a8bc0f1b883717284cd2d08886a65478566d183d85307ba885b786e5c6777941158d472fe1026e
SHA1 hash: b604aa7f5f14600f2f3045b740c232fbafd6f28d
MD5 hash: a0edebf8a014894d889847121a8b4324
humanhash: earth-oranges-butter-twenty
File name:PDA REQUEST DISCHARGE 55,000 MT GRAIN IN BULK_pdf.exe
Download: download sample
Signature AgentTesla
File size:1'567'744 bytes
First seen:2023-03-20 07:25:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:0sMSz4oqtmNpZ4gBbuvYel0tGzpw2SzE077/iakqAXCN2zgVv44I3ww2bZ0TqU:SgBbuvXl0tESL77/iakqASdVv4zwzt7
Threatray 59 similar samples on MalwareBazaar
TLSH T16C75E183F4CB72DED9189935C2C1A9FD7B549EF160E6D73C2FFA82D49014501A6823EA
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon d49e21a296968660 (11 x AgentTesla, 9 x Loki, 8 x SnakeKeylogger)
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PDA REQUEST DISCHARGE 55,000 MT GRAIN IN BULK_pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-03-20 07:29:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
VectorStealer
Verdict:
Malicious
Result
Threat name:
Vector Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Costura Assembly Loader
Yara detected Telegram RAT
Yara detected Vector Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 830332 Sample: PDA_REQUEST_DISCHARGE_55,00... Startdate: 20/03/2023 Architecture: WINDOWS Score: 100 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Vector Stealer 2->26 28 Yara detected Telegram RAT 2->28 30 6 other signatures 2->30 6 PDA_REQUEST_DISCHARGE_55,000_MT_GRAIN_IN_BULK_pdf.exe 3 2->6         started        process3 file4 16 PDA_REQUEST_DISCHA...IN_BULK_pdf.exe.log, ASCII 6->16 dropped 32 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->32 34 May check the online IP address of the machine 6->34 36 Queries memory information (via WMI often done to detect virtual machines) 6->36 38 Injects a PE file into a foreign processes 6->38 10 PDA_REQUEST_DISCHARGE_55,000_MT_GRAIN_IN_BULK_pdf.exe 15 48 6->10         started        14 PDA_REQUEST_DISCHARGE_55,000_MT_GRAIN_IN_BULK_pdf.exe 6->14         started        signatures5 process6 dnsIp7 18 api.telegram.org 149.154.167.220, 443, 49697, 49698 TELEGRAMRU United Kingdom 10->18 20 ipinfo.io 34.117.59.81, 443, 49695 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 10->20 22 discord.com 162.159.136.232, 443, 49696 CLOUDFLARENETUS United States 10->22 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->40 42 Tries to steal Mail credentials (via file / registry access) 10->42 44 Tries to harvest and steal browser information (history, passwords, etc) 10->44 signatures8
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-03-14 03:06:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
1126193683ba1cbfbdfd53ce493e78fc49d568854ddad8a9f23975fd55998b46
MD5 hash:
2cff9ef68570cc4b37f80a77af01a343
SHA1 hash:
ddec6ef37e20f4a4ce0889fa316d659b745585e2
SH256 hash:
12738dd126a3425bca406bde027109b42e1e64dc59176ba96bade304d456ac9e
MD5 hash:
492009fc746bcf887b9ffb4e96fd6ad2
SHA1 hash:
d50febf435255e7e952d16be32d43e06a80ddac8
SH256 hash:
a46d9db25a99c6ab48bf17eaae1357122d60405b3b84b34c07d59286981537fa
MD5 hash:
06a78c428c354127e4a8557e3095bd4f
SHA1 hash:
c4fcbc028d4d27f84069ef446d04af0fba170911
SH256 hash:
91589856c5441bf4f2beb17e98f404df5d65ec31bd68a09b845d618de808ab7b
MD5 hash:
b80bb907230800dcbc098d69951f54a5
SHA1 hash:
2af6e2e40c203e7790807975830a6b1265b33e13
SH256 hash:
8f0c7e3047346b8d6477ff6d4639fd6157602c7ebc840f3432b99263f1cb415c
MD5 hash:
e5b073b30db1b058298f5df032164e4d
SHA1 hash:
15d3ada4e7ac01b766615b9b66785e7e2ae9b0ca
SH256 hash:
48ae64ee3a74c4d134f8c6542d9374325cfd89430d27dd810d3fe0f4961d105e
MD5 hash:
a0edebf8a014894d889847121a8b4324
SHA1 hash:
b604aa7f5f14600f2f3045b740c232fbafd6f28d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 48ae64ee3a74c4d134f8c6542d9374325cfd89430d27dd810d3fe0f4961d105e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments