MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 4 File information Comments

SHA256 hash: 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
SHA3-384 hash: 82e973671b90966b89eb2b6b9b3afd1e04833b490055b52b836f7b45b26f46d384bb1fe2b2600145710a78076e29ae66
SHA1 hash: 5b245398672670653a2afdd33f0e0b02b0a5fc41
MD5 hash: d6f6d056221be8a9545efc7dff08e56a
humanhash: comet-august-jig-maine
File name:561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
Download: download sample
Signature AgentTesla
File size:3'677'696 bytes
First seen:2024-06-03 12:51:44 UTC
Last seen:2024-06-03 13:29:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 98304:/5KgsYz+zd0ympj+Wx8SLkzwTUCmpsG51Q28oFpePq:/qYqz25+8dkUwCasP2lpeP
Threatray 905 similar samples on MalwareBazaar
TLSH T1FA0622AC3260B4EFC55BCD76CAA81C24AA6030A7470BD103A59B15D89A5EBE7CF145F3
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 133730132b333300 (1 x EternityStealer, 1 x Babuk, 1 x AsyncRAT)
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
349
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
Verdict:
Malicious activity
Analysis date:
2024-06-03 13:11:08 UTC
Tags:
agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Banker Encryption Execution Generic Network Msil Dexter
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1451053 Sample: 5cZ288MSEf.exe Startdate: 03/06/2024 Architecture: WINDOWS Score: 100 97 mail.jalcepsac.com 2->97 99 jalcepsac.com 2->99 109 Found malware configuration 2->109 111 Malicious sample detected (through community Yara rule) 2->111 113 Antivirus / Scanner detection for submitted sample 2->113 115 11 other signatures 2->115 11 5cZ288MSEf.exe 7 2->11         started        15 tUwYoIHWfleeN.exe 5 2->15         started        17 pJlDdUQ.exe 2->17         started        19 PwrtvLGqv.exe 2->19         started        signatures3 process4 file5 91 C:\Users\user\AppData\...\tUwYoIHWfleeN.exe, PE32 11->91 dropped 93 C:\Users\user\AppData\Local\...\tmp46D4.tmp, XML 11->93 dropped 135 Detected unpacking (changes PE section rights) 11->135 137 Detected unpacking (overwrites its own PE header) 11->137 139 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->139 147 3 other signatures 11->147 21 5cZ288MSEf.exe 6 11->21         started        25 powershell.exe 22 11->25         started        27 schtasks.exe 1 11->27         started        33 4 other processes 11->33 141 Antivirus detection for dropped file 15->141 143 Multi AV Scanner detection for dropped file 15->143 145 Machine Learning detection for dropped file 15->145 29 tUwYoIHWfleeN.exe 15->29         started        31 schtasks.exe 15->31         started        signatures6 process7 file8 89 C:\Users\user\AppData\Roaming\pJlDdUQ.exe, PE32 21->89 dropped 127 Adds a directory exclusion to Windows Defender 21->127 129 Injects a PE file into a foreign processes 21->129 35 5cZ288MSEf.exe 21->35         started        39 powershell.exe 23 21->39         started        41 schtasks.exe 21->41         started        131 Loading BitLocker PowerShell Module 25->131 43 conhost.exe 25->43         started        45 conhost.exe 27->45         started        47 tUwYoIHWfleeN.exe 29->47         started        49 schtasks.exe 29->49         started        51 conhost.exe 31->51         started        signatures9 process10 file11 87 C:\Users\user\AppData\Roaming\PwrtvLGqv.exe, PE32 35->87 dropped 117 Adds a directory exclusion to Windows Defender 35->117 119 Injects a PE file into a foreign processes 35->119 53 5cZ288MSEf.exe 35->53         started        56 powershell.exe 35->56         started        58 schtasks.exe 35->58         started        121 Loading BitLocker PowerShell Module 39->121 60 conhost.exe 39->60         started        62 conhost.exe 41->62         started        64 tUwYoIHWfleeN.exe 47->64         started        66 schtasks.exe 47->66         started        68 conhost.exe 49->68         started        signatures12 process13 signatures14 70 5cZ288MSEf.exe 53->70         started        123 Loading BitLocker PowerShell Module 56->123 73 conhost.exe 56->73         started        75 conhost.exe 58->75         started        125 Injects a PE file into a foreign processes 64->125 77 tUwYoIHWfleeN.exe 64->77         started        79 conhost.exe 66->79         started        process15 signatures16 81 5cZ288MSEf.exe 70->81         started        133 Injects a PE file into a foreign processes 77->133 85 tUwYoIHWfleeN.exe 77->85         started        process17 dnsIp18 95 jalcepsac.com 66.70.255.14, 49706, 49713, 587 OVHFR Canada 81->95 101 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 85->101 103 Tries to steal Mail credentials (via file / registry access) 85->103 105 Tries to harvest and steal ftp login credentials 85->105 107 Tries to harvest and steal browser information (history, passwords, etc) 85->107 signatures19
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-05-09 07:34:37 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla execution keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
AgentTesla
Unpacked files
SH256 hash:
a9f6565af3c949ad0f4dde4e0bd8e3b21eb581ae5a5efecf8b8b1828d9dc8820
MD5 hash:
8381a94b3ee06c7e52e7f01b4361cf9d
SHA1 hash:
29f68f086c4978a688498ab12f9061a8798ca0c0
SH256 hash:
3ccd7c44bafdb4a53d86e0be9345620d5a1a9863dab041ac80dec29d31b555db
MD5 hash:
a324d9711fab5ef7db3fa0f91cce663b
SHA1 hash:
4fe280740143df4543e5e3c16f357204c6a46f55
SH256 hash:
925a02479f706216058e6cf4d91699eb576eeefb9dc04c2ece544569154fe891
MD5 hash:
bf426feba5a9a2f55c1a2e439b3f46c2
SHA1 hash:
4b547c42a4a14a4edac9fce0484eeff41f1ec116
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :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 hash:
0fc3692505b5b23aee4c3f1ed0736b9e8b508858fa8e7712e5d2f54e75e4c54f
MD5 hash:
f314babf5b4ce7adc4c72371accb9742
SHA1 hash:
cddad483477c7916027947b6536c32de51f2cf62
SH256 hash:
6a2701e554baa3cfcfd7e1817eff18987858045befb05ea8f7624ef3b1116008
MD5 hash:
b97b960ee6751d5a872b4744237ee48a
SHA1 hash:
2aa3b2b3e134f7d0db220c3788f44ba04dff06a5
SH256 hash:
295be96347c3ee2a2ba7f10e88267274d7b0c5cd7dcf14108f76ac03c5130520
MD5 hash:
35292829892ad204f2eb60fe087d3d3c
SHA1 hash:
c1729353c32c4620a835dd417076a2413fc8f675
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :
cbe4153add0b29b67e77346f502369fd6430c3903dd15f66109169653a77a320
d223cfe6d16b1305e8b67cadaa79ebf9321a16c299ef1ccb71289b4ec4f30589
26d326d58b211204d13d7c4de057ecbc4d0d393862d33d200ac20d47c3329f79
1f9bb30664b00d710ecedcdd485de690c25e38199c86fc2fe350c7e11c660fd4
d36c75eeda6238e518fffee0f4b12fc0fc2e1d56d478e07b64e71814b0f4e1bb
3b58c6a333d32e3bd9e2fca922160a2173229155b2d400abbf34bd87bc3a4649
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5
a745b4a8dbdad5c84183ce33793aac75423bdb99fd3a3fca646fbeb66e1059f2
74bc25305325ee41319153323e722fb21fa052f0e5b0006d12894e906efcd838
ca46f828ef9afce366976d3e6d5e06b8a7e1dcd971eda8ceca5c75289e81b688
7aca6825bcc57d37bd12f4975818ef6fb846766a335c1fd5f79b154d4ea89842
65b79e68d650ab1f2d6fc5d048b27bc44d54e5cb8f310932b3e18d034ecd234a
ee66629e98c3278017e7297d3b2b57aac9783a51a46b34046ccc866d10ba4f3c
7b3d904c7e1ef9ac37cf347bf40113e0f074b35004a90dc3bc2443312c4c1bfc
71eea3c3d6de8b4666d87e3771155bb9c372615eeb5519999ad2fda159f13968
ae16694e0640bfcb3d53389a2a11f459066625d9cfaf982a79b2bda3a26e97b6
93bf3f062ed4ad9f478559a984e2d13c646acabafc88c44e06e2a3e660ce3a58
9f0940b08d229480a45cd4f9d104ab5da0829dddcd968581aee5fad92b91fa80
4e0b653a92bc80b91eb6797f5b5d252710790117dd5fb0038ba15e36a58a4da3
b8f5159a474b7be7218d053df0795d326474f2d5f8deeff6c38d5141d3ecd4ee
27ac3f8a2082fcd8246bff0281e760d36edcaef16ef2831d14138b8df82ab86f
38c705a8dd3a80a55f20d881ce5e6c848201ba129ef8a8ba990cc3899d5b2a68
3cfce085b5cdc5db01a2223105789afda600249a89bad3a2e29066b4ab6050ae
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
1191d3f484d35c7e4d42ac7bcdd2227930f848383873d914e8010bfe637e0122
SH256 hash:
4909093c1045073940daf73778f88ce3e5d4dcbc0d69e3498ad4672c2e699013
MD5 hash:
28b43a10958caef0465f7b93be0a0d77
SHA1 hash:
9c85c1cb7f6face0a6c8d0a2d2314a99092d6554
SH256 hash:
7f2ce1b563872c87a9bc6dbb894525a36ce8228332b0519340f5698724505ed4
MD5 hash:
2ef7bb15b0d13ee4bd6289c254fc856b
SHA1 hash:
9149f5d908f206202c3d2121fc9137cc5b101946
SH256 hash:
7c1d688e21cc647ec201ad0a3647ccf102f2ed1e18cf405e2b1cbd3241d2abb6
MD5 hash:
1d4b001c7a38a081293bad2d0cae99fd
SHA1 hash:
222e9754b9661c4f9e460e7e7aa9e8d12845f60d
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
MD5 hash:
d6f6d056221be8a9545efc7dff08e56a
SHA1 hash:
5b245398672670653a2afdd33f0e0b02b0a5fc41
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments