MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82f5deb6c4fcc0e1024ce95e8723df267ebedbdccd94ec1e296e037fd59976f1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 82f5deb6c4fcc0e1024ce95e8723df267ebedbdccd94ec1e296e037fd59976f1
SHA3-384 hash: 1f89afd8c0f3b38f21ac6999ee4252799fa9ac92f50b920093be5e78cb5c11a8ccb700f4e7bf66390132ddc3cb25896f
SHA1 hash: 731081545ac19b179686dbe1496e6b08b275250a
MD5 hash: d1925f28c84577816e7d8b05a8cdf310
humanhash: apart-one-juliet-virginia
File name:BEFEHL#771490168489.exe
Download: download sample
Signature AgentTesla
File size:601'088 bytes
First seen:2023-05-16 10:38:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:qlysS3UG2yc6FhsBEjHqNxsnWE9RqrRyVpCtQX+M2LgHoP:rUGonBEjMsnWE9RS2CGX+MagHW
Threatray 3'634 similar samples on MalwareBazaar
TLSH T156D4F069A1FA0B63D37D83F545A825020B7472A37C2BD53C5EDE20C9FA57F501A98AC3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
242
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BEFEHL#771490168489.exe
Verdict:
Malicious activity
Analysis date:
2023-05-16 10:39:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
floxif packed threat virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected Telegram RAT
Yara detected zgRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2023-05-15 12:37:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
20 of 36 (55.56%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot5932003035:AAGiWu3EDh9FYzqRKIySebzjjQ5uW0afS3o/
Unpacked files
SH256 hash:
ddbcbf7800a8741b449a092b8cca3eba53ed1b177e0ed678d8dc882eba6f33c4
MD5 hash:
09e4a78438f9f84199950ee287c44061
SHA1 hash:
e232fe4700adb4b7f5553c33e6b3795f17c4961a
SH256 hash:
d3b762d695e982bc86ff1ca0c699d045da31ec1f8b8fe6ba442f47db9f5dd448
MD5 hash:
e5d28313f32abcdbd2645a7597c0928a
SHA1 hash:
d29828a86e69a4441ae4cee530b807e1e9e71fd6
SH256 hash:
024b2efa8f2bbe47576027b07d806374c816cbd0dfc48a2e80a0b4ae14a79d66
MD5 hash:
2b915657bda9212d05cdc9510c4738b2
SHA1 hash:
bb3a29458cd1b5aebfbd8bfeca92dae6d0ba4e7c
SH256 hash:
cf83ebdd131f41a6d18026a3cd4d652dfa2d229565e5f4fed5ad3c9ffc544f53
MD5 hash:
bd09e6b84f43b13f3faa7d41792de99f
SHA1 hash:
6ad2ea32c617b9af7769034012bafba6f26b7baf
Detections:
AgentTeslaXorStringsNet
SH256 hash:
6722a58c81f6d11004e880bd8481acc423bf96afd46bf692f1562cfa4c5852bd
MD5 hash:
d92d2ba953be4be2d6f2bc859ec5c607
SHA1 hash:
05da51752277bd907ebcfb799524ec7655abbc3a
SH256 hash:
82f5deb6c4fcc0e1024ce95e8723df267ebedbdccd94ec1e296e037fd59976f1
MD5 hash:
d1925f28c84577816e7d8b05a8cdf310
SHA1 hash:
731081545ac19b179686dbe1496e6b08b275250a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments