MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70c499252627effa5dccc94f8cb4a7c160455ce1bc0121ba12b4d20e79f543e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 70c499252627effa5dccc94f8cb4a7c160455ce1bc0121ba12b4d20e79f543e9
SHA3-384 hash: 606f714c9daf5322f47de63c0346f74e9667d8f4d1034acf4e15d97219fc3e4da5d5b86a3a1937e87ca5f635c37f054e
SHA1 hash: 62df7182a00b1c425cd87195c4f2a19dea2583ac
MD5 hash: ea8ef96952b61210004b45e0b4fcfb84
humanhash: burger-floor-sad-helium
File name:PURCHASE ORDER (2).exe
Download: download sample
Signature AgentTesla
File size:1'061'376 bytes
First seen:2023-06-22 17:32:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 24576:Y1KNoT1Fn1XWOa7RXHM9rdsIg4QoxEDF6ySoNAAhNds:Y1KNoTXn1Xna7RXkd/LQoxED/SURhNds
Threatray 3'201 similar samples on MalwareBazaar
TLSH T1D53523AD12F69202CA630BB4685567B047FB9C4EF125C8470E8732CEDA6BAD55A7C703
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter lowmal3
Tags:AgentTesla api-telegram-org exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
273
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
PURCHASE ORDER (2).exe
Verdict:
Malicious activity
Analysis date:
2023-06-22 17:33:52 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Enabling autorun by creating a file
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, Neshta
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected Neshta
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 892925 Sample: PURCHASE_ORDER_(2).exe Startdate: 22/06/2023 Architecture: WINDOWS Score: 100 82 api.telegram.org 2->82 98 Snort IDS alert for network traffic 2->98 100 Found malware configuration 2->100 102 Malicious sample detected (through community Yara rule) 2->102 104 13 other signatures 2->104 9 PURCHASE_ORDER_(2).exe 7 2->9         started        13 ioYeuLYI.exe 3 5 2->13         started        15 svchost.com 2->15         started        17 svchost.com 2->17         started        signatures3 process4 file5 74 C:\Users\user\AppData\Roaming\ioYeuLYI.exe, PE32 9->74 dropped 76 C:\Users\...\ioYeuLYI.exe:Zone.Identifier, ASCII 9->76 dropped 78 C:\Users\user\AppData\Local\...\tmpFEBB.tmp, XML 9->78 dropped 80 C:\Users\user\...\PURCHASE_ORDER_(2).exe.log, ASCII 9->80 dropped 138 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 9->138 140 May check the online IP address of the machine 9->140 142 Uses schtasks.exe or at.exe to add and modify task schedules 9->142 150 2 other signatures 9->150 19 PURCHASE_ORDER_(2).exe 17 12 9->19         started        24 powershell.exe 21 9->24         started        26 powershell.exe 16 9->26         started        28 schtasks.exe 1 9->28         started        144 Multi AV Scanner detection for dropped file 13->144 146 Machine Learning detection for dropped file 13->146 148 Drops executables to the windows directory (C:\Windows) and starts them 13->148 30 svchost.com 13->30         started        32 ioYeuLYI.exe 13->32         started        34 UmajCN.exe 15->34         started        36 UmajCN.exe 17->36         started        signatures6 process7 dnsIp8 90 api4.ipify.org 104.237.62.211, 443, 49720, 49721 WEBNXUS United States 19->90 92 api.telegram.org 149.154.167.220, 443, 49722, 49723 TELEGRAMRU United Kingdom 19->92 94 api.ipify.org 19->94 56 C:\Users\user\AppData\Roaming\...\UmajCN.exe, PE32 19->56 dropped 58 C:\Users\user\AppData\Roaming\...\bin.exe, PE32 19->58 dropped 60 C:\Users\user\...\UmajCN.exe:Zone.Identifier, ASCII 19->60 dropped 114 Tries to steal Mail credentials (via file / registry access) 19->114 116 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->116 118 Installs a global keyboard hook 19->118 38 bin.exe 19->38         started        42 conhost.exe 24->42         started        44 conhost.exe 26->44         started        46 conhost.exe 28->46         started        62 C:\ProgramData\Adobe\...\AdobeARMHelper.exe, PE32 30->62 dropped 64 C:\ProgramData\Adobe\...\AdobeARMHelper.exe, PE32 30->64 dropped 120 Antivirus detection for dropped file 30->120 122 Multi AV Scanner detection for dropped file 30->122 124 Machine Learning detection for dropped file 30->124 126 2 other signatures 30->126 48 schtasks.exe 30->48         started        96 api.ipify.org 32->96 file9 signatures10 process11 file12 66 C:\Windows\svchost.com, PE32 38->66 dropped 68 C:\Users\user\AppData\Local\...\DismHost.exe, PE32 38->68 dropped 70 C:\Users\user\AppData\Local\...\setup.exe, PE32 38->70 dropped 72 7 other malicious files 38->72 dropped 128 Antivirus detection for dropped file 38->128 130 Multi AV Scanner detection for dropped file 38->130 132 Creates an undocumented autostart registry key 38->132 136 3 other signatures 38->136 50 bin.exe 38->50         started        134 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 42->134 54 conhost.exe 48->54         started        signatures13 process14 dnsIp15 84 api4.ipify.org 50->84 86 api.telegram.org 50->86 88 api.ipify.org 50->88 106 Multi AV Scanner detection for dropped file 50->106 108 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 50->108 110 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 50->110 112 5 other signatures 50->112 signatures16
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-06-22 17:33:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:agenttesla family:neshta collection keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Detect Neshta payload
Neshta
Malware Config
C2 Extraction:
https://api.telegram.org/bot6273608329:AAG3u2MeOPuXoRF0JxN21l5a1qWq-w0byv8/
https://api.telegram.org/bot6198912739:AAFWwPOzcAOeh_bttxtGKKR_RIR4wgbcmQU/
Unpacked files
SH256 hash:
52f358d201e81d3a0391cedd3042e2f957555b77aa49559f7fb810bbb7673ba1
MD5 hash:
c785ddc46141af772c75101d17c46a41
SHA1 hash:
e248723b6f60cc7607980d07172b64c33b2b2f15
SH256 hash:
ec914c3660af88df03518a8535f677aa1e4b7629fff28203c7612933ef027de4
MD5 hash:
ba8972841328bf5e6e8b1b8d133cc40e
SHA1 hash:
dfeef4c0856488b664eafa9dabd5c24e4b9bb28e
SH256 hash:
82877301a0310c98855ece53a8105c2d8056cd8737b25aadb70ec9cb77194691
MD5 hash:
978fda0e94289886902fa1be708e4a31
SHA1 hash:
d1fe63882639084cbca3e1dd0290006166fd47f7
SH256 hash:
0160739cfd8d1897931f6821d701e3089c2bbd03d3ff8ed977ca4c618876b7e4
MD5 hash:
42fa7553572a0e8d2056a7c77597f57a
SHA1 hash:
c1beb634d03f733eedf2f2b4fc3ab14a4b388ae6
SH256 hash:
70c499252627effa5dccc94f8cb4a7c160455ce1bc0121ba12b4d20e79f543e9
MD5 hash:
ea8ef96952b61210004b45e0b4fcfb84
SHA1 hash:
62df7182a00b1c425cd87195c4f2a19dea2583ac
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 70c499252627effa5dccc94f8cb4a7c160455ce1bc0121ba12b4d20e79f543e9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments