MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61f8d11bd98b3fca7ab5239e2fd784d5126617813f7f2c358d32c73eb1686417. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 61f8d11bd98b3fca7ab5239e2fd784d5126617813f7f2c358d32c73eb1686417
SHA3-384 hash: 0ba0b04bb5803fc7641974ec6068ab72380d6b3e12f4de019120f6fc0caf09974c072807c0d9257504adac81d429305a
SHA1 hash: 919287922914c5a59fc13270bd4f2b6f27930950
MD5 hash: 32e7a6c613f21394c0f89b8b948e4f01
humanhash: white-tennessee-robin-vermont
File name:SecuriteInfo.com.Trojan.Inject4.4219.7534.18546
Download: download sample
Signature AgentTesla
File size:2'235'296 bytes
First seen:2020-11-05 17:41:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 3072:utYkjNh3EOp77wzq+ZBziTHRuOPh7U9zr+CEzFlcPrs9O31JMk5reakNFhjydClO:BkRRdw
Threatray 1'009 similar samples on MalwareBazaar
TLSH 50A54C22A0B67F2CE2C33587252087758FFDFC66416DBE50D2907A71BD92D691EB031A
Reporter SecuriteInfoCom
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Unauthorized injection to a recently created process
Adding an access-denied ACE
Creating a window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Scarsi
Status:
Malicious
First seen:
2020-11-04 13:14:32 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Drops startup file
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
61f8d11bd98b3fca7ab5239e2fd784d5126617813f7f2c358d32c73eb1686417
MD5 hash:
32e7a6c613f21394c0f89b8b948e4f01
SHA1 hash:
919287922914c5a59fc13270bd4f2b6f27930950
SH256 hash:
0a352fb0f5e8fe42cc399769f3acd8fe922645c60815bb6711db5f9edc67b619
MD5 hash:
e81fe729f6cdb8d4dfe60ebe7130a963
SHA1 hash:
4d3c910e38aa92baf6f14e453ac1272e0cc4d9c8
SH256 hash:
8002dffbb036555ddb50d925e90356a74312f9a74d7e8021a22863b6a4980e36
MD5 hash:
8ec0799c8a6f81f9c5ad19bd35a73430
SHA1 hash:
87bdefc18188376e8009d44a7900f8e27069a8ff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 61f8d11bd98b3fca7ab5239e2fd784d5126617813f7f2c358d32c73eb1686417

(this sample)

  
Delivery method
Distributed via web download

Comments