MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7dfe5d9e3e099285a3bc63497d1ee47ac99b7012f23beb730d73557b40afa26c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: 7dfe5d9e3e099285a3bc63497d1ee47ac99b7012f23beb730d73557b40afa26c
SHA3-384 hash: 13f4c8222c42dbef5c182948906d58fff2f2818e9c28b1e623a3a5e1c65b4b838a9a5f1d116158037dfe2362b86de73c
SHA1 hash: ff7fd12de0ddd6fa819db103d023e1b3e24a36d2
MD5 hash: 5ebf752e445c2a9222357ea6ed653556
humanhash: hydrogen-six-idaho-kilo
File name:Inquiry Copy.exe
Download: download sample
Signature AgentTesla
File size:531'968 bytes
First seen:2020-06-28 10:07:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:byb0NMfwm+TaXudfDUPWu+7G/cHTOwzora1hnaAqb6:A0NPNdraq7G/czODr+FH
TLSH 11B4020A37ACA117C9781AF564C64B0433726DABB6C1F2DE6CC07AD625F37E149612CB
Reporter @abuse_ch
Tags:AgentTesla exe


Twitter
@abuse_ch
AgentTesla SMTP exfil server:
smtp.yandex.ru:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
42
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
AgentTeslaV2
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Creating a file
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-28 10:09:06 UTC
AV detection:
25 of 31 (80.65%)
Threat level
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
spyware persistence keylogger trojan stealer family:agenttesla
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Modifies service
Maps connected drives based on registry
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Checks BIOS information in registry
Reads user/profile data of local email clients
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
AgentTesla

Yara Signatures


Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:win_agent_tesla_w1
Author:govcert_ch
Description:Detect Agent Tesla based on common .NET code sequences

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 7dfe5d9e3e099285a3bc63497d1ee47ac99b7012f23beb730d73557b40afa26c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments