MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7d16e17bac79f1f43967b698f3f47d0e3f9007198876f9118865e0a7e87315bf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 7
| SHA256 hash: | 7d16e17bac79f1f43967b698f3f47d0e3f9007198876f9118865e0a7e87315bf |
|---|---|
| SHA3-384 hash: | eb15f5d6ef5a51519fdd530f656b74b1dc41fa8a6de6969e58f3e7cfc768d310479b560c7d0ed5137ea3f687ea6bf3d6 |
| SHA1 hash: | e3ffc038f6671e33fa4309a4e49c3b1a74a78c38 |
| MD5 hash: | ad0eb73290c3391f694c729059163025 |
| humanhash: | carolina-alpha-oregon-nine |
| File name: | INVOICE.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 807'936 bytes |
| First seen: | 2020-09-10 14:32:38 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 107c3368e512cbae16bf262df208efd9 (8 x AgentTesla, 5 x MassLogger, 3 x Formbook) |
| ssdeep | 12288:5Am53b7XYJIdqam73S9gTmskNIpC6yr949IsSQ9Ibo1y/zL:aQ3gIdrbm8rGIsSQWb |
| TLSH | 3C056C26BFE1C873F0F31A3C5C476E74981A7DD32928595AFBE8DD0C8E296513929087 |
| Reporter | |
| Tags: | AgentTesla exe |
abuse_ch
Malspam distributing unidentified malware:From: Exports Manager<gopi@alangroups.com>
Subject: Payment For Outstanding Invoices
Attachment: PO.gz (contains "INVOICE.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching a process
Sending a UDP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Delayed program exit found
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-09-09 16:38:44 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Result
Malware family:
agenttesla
Score:
10/10
Tags:
upx spyware keylogger trojan stealer family:agenttesla
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Farheyt
Score:
0.80
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.