MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7906ee05067f6ef5bfb9e5ea9ddd16575ca0830d465bc06a3cfedafaf6167192. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments 1

SHA256 hash: 7906ee05067f6ef5bfb9e5ea9ddd16575ca0830d465bc06a3cfedafaf6167192
SHA3-384 hash: bfc980d0fb3eccbd76624655afb4bed2d86fe600df4d5c5e97c1588e62a553dc0caf5fd0f35b18e580fd66b03c0e2234
SHA1 hash: 71d7ea0ce9d8da1248d281c3099ce7a2e6da4ac1
MD5 hash: 9f78a2d7e3d3e313d6a08ae547af7a20
humanhash: lamp-arizona-sierra-triple
File name:9f78a2d7e3d3e313d6a08ae547af7a20
Download: download sample
Signature AgentTesla
File size:656'384 bytes
First seen:2023-11-28 07:48:42 UTC
Last seen:2023-11-28 09:18:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:7oCQmbCpt3HvYdVyohNjg13Jb2ROS1avFMBvd3Gn+F:cF3PYd4ohNED2cMr3zF
TLSH T13BD4238233FCF45BF8B247FA9025429147BA78262530E6DA1E9071DD8CB2B91471AF37
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 68c4d2d2725a5252 (10 x Formbook, 8 x AgentTesla, 3 x SnakeKeylogger)
Reporter zbetcheckin
Tags:32 AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
299
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349096 Sample: N6eknRWMC1.exe Startdate: 28/11/2023 Architecture: WINDOWS Score: 100 57 ftp.acc-usering.xyz 2->57 59 api4.ipify.org 2->59 61 api.ipify.org 2->61 67 Snort IDS alert for network traffic 2->67 69 Multi AV Scanner detection for domain / URL 2->69 71 Found malware configuration 2->71 75 11 other signatures 2->75 8 N6eknRWMC1.exe 7 2->8         started        12 PyBQOQK.exe 5 2->12         started        14 winrar.exe 2->14         started        16 winrar.exe 2->16         started        signatures3 73 Performs DNS queries to domains with low reputation 57->73 process4 file5 53 C:\Users\user\AppData\Roaming\PyBQOQK.exe, PE32 8->53 dropped 55 C:\Users\user\AppData\Local\...\tmp9B04.tmp, XML 8->55 dropped 85 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->85 87 Uses schtasks.exe or at.exe to add and modify task schedules 8->87 89 Adds a directory exclusion to Windows Defender 8->89 18 N6eknRWMC1.exe 16 5 8->18         started        23 powershell.exe 21 8->23         started        33 2 other processes 8->33 91 Multi AV Scanner detection for dropped file 12->91 93 Injects a PE file into a foreign processes 12->93 25 PyBQOQK.exe 14 4 12->25         started        27 schtasks.exe 1 12->27         started        29 winrar.exe 14->29         started        35 2 other processes 14->35 31 winrar.exe 16->31         started        37 2 other processes 16->37 signatures6 process7 dnsIp8 63 ftp.acc-usering.xyz 66.45.232.107, 21, 49713, 49717 IS-AS-1US United States 18->63 65 api4.ipify.org 104.237.62.212, 443, 49711, 49714 WEBNXUS United States 18->65 49 C:\Users\user\AppData\Roaming\...\winrar.exe, PE32 18->49 dropped 51 C:\Users\user\...\winrar.exe:Zone.Identifier, ASCII 18->51 dropped 77 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->77 79 Tries to steal Mail credentials (via file / registry access) 18->79 81 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->81 39 conhost.exe 23->39         started        41 conhost.exe 27->41         started        83 Tries to harvest and steal browser information (history, passwords, etc) 31->83 43 conhost.exe 33->43         started        45 conhost.exe 35->45         started        47 conhost.exe 37->47         started        file9 signatures10 process11
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-11-28 07:15:16 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla_v4
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
dc2a31ebcef7e1b02ef0b2237da0e126dfebaa6a6336f829c0194b89793e239b
MD5 hash:
3d9dd0ed4f6deb6ad320d84fa5a40542
SHA1 hash:
f2daf79f4bfd1118856e13e1487c99259415d39e
SH256 hash:
f5a8f5ded618fd3989fa98a3c2d87c4853d6e10ecb1313cd5ddd7df375336b31
MD5 hash:
243f9990bb7d68a3f6e4d3999800da5b
SHA1 hash:
ba555175d12f19f6288a3574738bcd6c8b747e3b
SH256 hash:
f3892103429f7cdcc30afc04b43e8405c6f77c34be5feb7ef71047cb3ec927ef
MD5 hash:
4ab1ac658802e1a961f31e2896e920b3
SHA1 hash:
519021210b28ac9b9fc35b6704eb0374013f4077
Detections:
win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients MALWARE_Win_AgentTeslaV2 Agenttesla_type2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_EXE_Packed_GEN01
SH256 hash:
e83ab65ef89edf8e26822dc35a6028e987ae98eb56a673a5ed1426c4244677c6
MD5 hash:
caeed9005a41e7ace76e9466202e6e93
SHA1 hash:
258929d5ae3d815f4d3e6b4e23faca953cf5278e
SH256 hash:
7906ee05067f6ef5bfb9e5ea9ddd16575ca0830d465bc06a3cfedafaf6167192
MD5 hash:
9f78a2d7e3d3e313d6a08ae547af7a20
SHA1 hash:
71d7ea0ce9d8da1248d281c3099ce7a2e6da4ac1
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe 7906ee05067f6ef5bfb9e5ea9ddd16575ca0830d465bc06a3cfedafaf6167192

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-11-28 07:48:43 UTC

url : hxxp://107.173.229.146/175/wlanext.exe