MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 7 File information Comments

SHA256 hash: 63ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a
SHA3-384 hash: 269466839d3cee5bdd240aa2c696d38ef2a20d057aff1234ea573b20545a030d44f34841bdedcdf02fa4aa3eebe5cf8c
SHA1 hash: 01db1b034184d31c03003ab7f81cf872e68b44d8
MD5 hash: 541967864e3bbe8c0258186e7f9a7489
humanhash: nevada-south-helium-may
File name:541967864e3bbe8c0258186e7f9a7489.exe
Download: download sample
Signature AgentTesla
File size:964'096 bytes
First seen:2024-12-19 07:17:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:9Wu2uOKkoNsHqSqyhEGBq/JBnGa3iUysgS21mu2:9cuKoJSqCAhB7C1s
Threatray 4'196 similar samples on MalwareBazaar
TLSH T17125D0D03B3A7702DE7C69349536EDB862652E687000B8E76EDD3B47769C202AE1CF54
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon 84b2a8a0e2dab28c (7 x Formbook, 2 x AgentTesla, 1 x RemcosRAT)
Reporter abuse_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
404
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-12-18 02:05:27 UTC
Tags:
amadey botnet stealer loader lumma rhadamanthys auto coinminer arch-exec themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.9%
Tags:
remcos virus micro
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2024-12-18 04:44:52 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
50c23cf1bdf68e01d7d26b3030336900e3afe66c8d6bd41c4d839309c7a73424
MD5 hash:
8517ea71646b99abee61472b11656e06
SHA1 hash:
c8adbdc0da52264dde1f14db1985323465c23c4d
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
df3b558797f074746eb3c69cd6b8b8d7af1f9148983f360f0859e87840e7a653
MD5 hash:
01a15b090fae48a138040ab6c3aaf509
SHA1 hash:
4695cdcda550d3c65614497e4229e886d9dc5e1a
SH256 hash:
c241021087cba5d11ddc6df0c4640464c36ccd440322ca8d3d17d8930d3bff15
MD5 hash:
775dc9fd1f91ed9d2ba286ffe2a0a850
SHA1 hash:
160edcb7e6c8efaa0d60761c2aab1f681223fd09
SH256 hash:
117c984a4b6c0bc0d29ee3bee08babe51bf8e5e9288726974c200fd5ca58ed10
MD5 hash:
bc07fcf586482a89d878684072409c5a
SHA1 hash:
ca195505dd9659666eb029983f6e189ce316ae9e
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SH256 hash:
ce5055cdc81c01e31b43555f3acea317c7249b9701c5526f532b7b16522773f0
MD5 hash:
59e6bc6bcd663539eb20b44462912b8a
SHA1 hash:
a3986291fb8b2c7c8c0677bfdcf075ecd142ac2b
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
0a0486ff2c231cc76197b2dc7b0e3ffedd21c4e279a863b92c3c8113cd862241
MD5 hash:
63c6439c54ebb9a3228bd1bff83d54bd
SHA1 hash:
0548b21470470516ab96be47d24ac3ea49ae0981
SH256 hash:
63ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a
MD5 hash:
541967864e3bbe8c0258186e7f9a7489
SHA1 hash:
01db1b034184d31c03003ab7f81cf872e68b44d8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 63ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments