MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58a3370efce2b3045579760da0365b5c7b7a54361d0350b7d1aa3d1b1ed1cfc3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 58a3370efce2b3045579760da0365b5c7b7a54361d0350b7d1aa3d1b1ed1cfc3
SHA3-384 hash: 21c4a0c6f1e6108e79c1411cbc430a3de0263f9bb9c8c7a982536b4db5aa315cd2e5254822fb66abd59d69cc5cf79fe1
SHA1 hash: 6924ce084fc8e45878989f447d1cf3cad9850483
MD5 hash: 17e31cd9435247ad7d3416785dc62501
humanhash: johnny-single-nevada-north
File name:IMG-20221108-WA000000000093.jp..exe
Download: download sample
Signature AgentTesla
File size:319'905 bytes
First seen:2022-11-10 19:57:25 UTC
Last seen:2022-11-10 21:44:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 29b61e5a552b3a9bc00953de1c93be41 (174 x Formbook, 82 x AgentTesla, 81 x Loki)
ssdeep 6144:MEa0Nok7l7BYw+Ez2ihYo3zWkah9sGP+FYvs/q25PLRU5YIsNs7IccIgF7dza/qk:Xok7luw7y8Yo3zWddHEieP0zsPccf+Sk
Threatray 21'356 similar samples on MalwareBazaar
TLSH T1DF641202A7D5D04BD197E6375421B775CBBACF444246B65B0BD28EABAF692038F0C229
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter GovCERT_CH
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
230
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
IMG-20221108-WA000000000043.r02
Verdict:
Malicious activity
Analysis date:
2022-11-09 05:58:11 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook lokibot nemesis overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Detected unpacking (creates a PE file in dynamic memory)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-11-09 04:45:05 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla payload
AgentTesla
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
51e87cd01ca6e33d089cf41cc8a0434ad409ce8a992a8b0a8207b5e29b2ff734
MD5 hash:
956e5d888900d905d52762140772cf5c
SHA1 hash:
e5ab0db86fce448e149204a8bca89e141cd92c48
SH256 hash:
112567f0fcf0f0dc4953d7d656bbd95c2cced351fbe0134a82a5793c376dc0ce
MD5 hash:
20ba1749a2d2acbb2476bcdcddabdd6d
SHA1 hash:
a1ea0922b72a37ea9efb97a1bc10da9cedd8ce40
SH256 hash:
58a3370efce2b3045579760da0365b5c7b7a54361d0350b7d1aa3d1b1ed1cfc3
MD5 hash:
17e31cd9435247ad7d3416785dc62501
SHA1 hash:
6924ce084fc8e45878989f447d1cf3cad9850483
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 58a3370efce2b3045579760da0365b5c7b7a54361d0350b7d1aa3d1b1ed1cfc3

(this sample)

  
Dropped by
agenttesla
  
Delivery method
Distributed via e-mail attachment

Comments