MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 70786a83bfa0b84514ea47447505e87fe3a2daa1357f1ab76b864039d33c0fe8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 15
| SHA256 hash: | 70786a83bfa0b84514ea47447505e87fe3a2daa1357f1ab76b864039d33c0fe8 |
|---|---|
| SHA3-384 hash: | cf1d5bed13ef35eaff6c846e4019b71a40c489d2d0053613d01b535627f41f65ac3aeb5a7529fe08f530d55443a4ed1c |
| SHA1 hash: | 0cc7c1dad6ad2330cd9e4a80696a1b1d7948d2d4 |
| MD5 hash: | c7069f161b5e41daa4944dfb7e3d03fa |
| humanhash: | alaska-bravo-texas-nineteen |
| File name: | OC 005197.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'048'576 bytes |
| First seen: | 2025-03-24 12:19:29 UTC |
| Last seen: | 2025-03-24 12:21:31 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:Hu6J33O0c+JY5UZ+XC0kGso6FaAjLg3ASlchRmWY:Bu0c++OCvkGs9FaAhsch7Y |
| TLSH | T18325BE2273DDC360CB769133BF69B7016EBF38614630B95B2F980D7DA950162262D7A3 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10522/11/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4504/4/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV2 |
|---|---|
| Author: | ditekshen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AgentTeslaV2 |
|---|---|
| Author: | ditekSHen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_Imphash_Mar23_3 |
|---|---|
| Author: | Arnim Rupp (https://github.com/ruppde) |
| Description: | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
| Reference: | Internal Research |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.