MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6703706a8c532bece036e36fc650fc082b04c5b771e5c2458adf28fdc667ad97. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 4 File information Comments

SHA256 hash: 6703706a8c532bece036e36fc650fc082b04c5b771e5c2458adf28fdc667ad97
SHA3-384 hash: b9f061d59ff186808f797ee8eed71914a4dadc756561c57f8c932f2f4392e5e876c88151fc6fa6d79519440e91ce3394
SHA1 hash: 738d0628cbf225253a9bbb41251cc5c641862a0e
MD5 hash: 83968d9a28921d060d0ea722c8926f52
humanhash: iowa-east-foxtrot-bulldog
File name:COTIZACIÓN-GRUPO.pdf.exe
Download: download sample
Signature AgentTesla
File size:668'672 bytes
First seen:2023-10-11 16:52:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:tQX9KYL5hIvaVWPTyQkQAhENwYgol4vW:tQtuvaV3QkQAhENFgolAW
TLSH T1F0E4F12423688BA7E23E4BFB55B4031207F97527307AE39C8ED218CF5E61F528564A77
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter malwarelabnet
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
280
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
COTIZACIÓN-GRUPO.pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-10-11 16:55:51 UTC
Tags:
agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
Likely Malicious
Threat level:
  10/10
Confidence:
100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-10-11 10:55:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
a040efb5ce92995b5d40fd2536c8ad6a93f2d8584a3dd52f07cdb0b34c9e6e29
MD5 hash:
a5a52675690de850e3de6c05a9bd885f
SHA1 hash:
fd953edf2e910fbb43c9e6d4c8d48632bb4e55c6
SH256 hash:
262611bf98f4e161a34f01686e175d2d46d173812c3d64be882ed8baaad5c932
MD5 hash:
49c952d876a5a4ff917369ebe7f1a8e5
SHA1 hash:
eca63a0f3489780e60d60e2176cd0bafec97ddeb
SH256 hash:
b730a1c9f6b6fb7f4efa9164a9665a368ff53d05ea643a83d970ae462de6eaf8
MD5 hash:
0aefd4fffb7a934b2db5aad6014dbaef
SHA1 hash:
5df4e29335a82d147f21a3516cb1b6d3f9a4e885
SH256 hash:
10278cf5ab1c5f5546dfb1304bbda18ca675a0e8e1349dcb0ef31ed6194faf8c
MD5 hash:
38fac24186205e7e454668f493ee4be8
SHA1 hash:
0c0b6cf267e9ce8bee16231bd1de791cd19cbb0c
Detections:
AgentTeslaXorStringsNet
Parent samples :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 hash:
6703706a8c532bece036e36fc650fc082b04c5b771e5c2458adf28fdc667ad97
MD5 hash:
83968d9a28921d060d0ea722c8926f52
SHA1 hash:
738d0628cbf225253a9bbb41251cc5c641862a0e
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments