MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a45965e8432c999b09077ed80bea92d88221b1acdc4438cef1fced193e9e775. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 6a45965e8432c999b09077ed80bea92d88221b1acdc4438cef1fced193e9e775
SHA3-384 hash: 67492f9c2c98b182fc4dd0ad266b6b3a7f655a802bdd9f5ed8f06fefa55029f8c19fa38f3125f98d86b9cc0fc2002630
SHA1 hash: 178a1fa31de25bb407711c0a15bbca17379da858
MD5 hash: 1aa0a694514e8d6f9c6bac9ce30012da
humanhash: alabama-ack-july-april
File name:1aa0a694514e8d6f9c6bac9ce30012da.exe
Download: download sample
Signature AgentTesla
File size:878'592 bytes
First seen:2022-10-01 07:38:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:QpIX6XsLSYSx9z+WbvFKgiyoYSbAn0zyq:Q06gSBxbKyScn0zy
Threatray 20'275 similar samples on MalwareBazaar
TLSH T13115D02A3AD5A64FC017D979C5D0DDB1E754EC22E21BC383A6C71C6FF44E56ACB102A2
TrID 64.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.5% (.SCR) Windows screen saver (13101/52/3)
9.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon ce9c9496e4949c9c (73 x AgentTesla, 51 x SnakeKeylogger, 30 x Formbook)
Reporter abuse_ch
Tags:AgentTesla exe Telegram

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
6a45965e8432c999b09077ed80bea92d88221b1acdc4438cef1fced193e9e775.exe
Verdict:
Malicious activity
Analysis date:
2022-10-01 09:38:14 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Using the Windows Management Instrumentation requests
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-09-30 09:21:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
20 of 41 (48.78%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot5618720367:AAFqeS2K5cBYFRaIBpS6oi_RaSYSI0_A__w/
Gathering data
Unpacked files
SH256 hash:
103041b1fa47676cca2d8013b8a73c2a2b277ef09bb97144ace1118cdbf9864f
MD5 hash:
65c39971561d6d3501f74a48758ce074
SHA1 hash:
e15c5bcd027883751364b73b2274497c74eb800d
SH256 hash:
9e4eb5ab8f68f93c156ace96ef33d425f16e8ab4984678aee289a6716af8e504
MD5 hash:
dc296156a1646b42d31c77c91b39eb05
SHA1 hash:
92c5855a188510a9edc435c9b3906b37f15b526e
SH256 hash:
2470b39032f6182252039c88199016566b0de30c6aa02163a143427afedd12af
MD5 hash:
c3a1924684ca30ed22234ce1d9111dfc
SHA1 hash:
7347706241422758c06440fd6044ae4e042b456b
SH256 hash:
00bdcfd3471ec1c9e3fba9ba1e51ac980c6a8f649729235f08509ebd95818d65
MD5 hash:
8aa2b5ee2aa721874abcb100bbeb3f21
SHA1 hash:
47c1311cc365d5f6eac482cdb9efb36ba9432517
SH256 hash:
edadc813f4440ada276da601d8f31780e5e138b8ee392e3f49a509322a1fb51e
MD5 hash:
574597554c69083c1af2b742a97a92b6
SHA1 hash:
043eea660b8650c5a0042f842fd8db3516d37a2c
SH256 hash:
6a45965e8432c999b09077ed80bea92d88221b1acdc4438cef1fced193e9e775
MD5 hash:
1aa0a694514e8d6f9c6bac9ce30012da
SHA1 hash:
178a1fa31de25bb407711c0a15bbca17379da858
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 6a45965e8432c999b09077ed80bea92d88221b1acdc4438cef1fced193e9e775

(this sample)

  
Delivery method
Distributed via web download

Comments