MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
SHA3-384 hash: ff26e9bf0a9ad94f2b3aff08f807ab430290864de6a94198b6d3c6a2d514551340c34b6db5bfad3a8fd6e04c7c00c564
SHA1 hash: 31b6aef080ee864059e8a82d8d9d2b3745578f2d
MD5 hash: 11ecf3ab5737650035ef7e9a3c57f80a
humanhash: may-johnny-alpha-oscar
File name:5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
Download: download sample
Signature AgentTesla
File size:779'264 bytes
First seen:2023-03-08 12:13:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:2dj50i653yhXyiQmHE1ODGK90f8EcgeL5KDmCxkFTmcj+f8p5:e50iE3yhXyiHE1ONe5eFKDmrFTzj+U
Threatray 544 similar samples on MalwareBazaar
TLSH T13BF40255B3A1C126C92824B5C4D39C6013F11E93B633DA0E795063A36F932FE9E57B8E
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 4f07090d0d014f8c (47 x SnakeKeylogger, 17 x Formbook, 13 x AgentTesla)
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
209
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-02-27 04:17:00 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
6
AV detection:
19 of 39 (48.72%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
.NET Reactor proctector
AgentTesla
Malware Config
C2 Extraction:
https://discord.com/api/webhooks/1077566111689740349/gnJjTpoCwEM3PNDQkU1Kb4C12Er7lUmsBkWDapkU4UnedFpWqrRphmnNJUx4027RyZXM
Unpacked files
SH256 hash:
5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd
MD5 hash:
11ecf3ab5737650035ef7e9a3c57f80a
SHA1 hash:
31b6aef080ee864059e8a82d8d9d2b3745578f2d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments