MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83311d05b5263b0c8cb8f264584d823d1eb95175322c7dcc13877ae13351775a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 83311d05b5263b0c8cb8f264584d823d1eb95175322c7dcc13877ae13351775a
SHA3-384 hash: ebd4e5ce6cadee064eebf0cd439d0b01d2c05f85df95b3e44e71f3d2a056dff6d0115ad4a3902c9da2e5270e9606221f
SHA1 hash: 71a4ac7bc37db6b784f1a73f5eec67b29e1e0948
MD5 hash: 0f4c6aa4deb8a10bb9438bdd075aeb72
humanhash: autumn-arizona-connecticut-equal
File name:DATASHEET-VALVES MA9881.exe
Download: download sample
Signature AgentTesla
File size:760'320 bytes
First seen:2023-05-30 06:27:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:S63iRp4qF0NN9jeFMbOMVqnIg/cS9qqRxZzP3UK78JIL0owVzHXtX44Zbj0IgScg:bm0P9jFxqnv/cS9Rxh3UhqLq3K4ZbA
Threatray 2'897 similar samples on MalwareBazaar
TLSH T19DF48BEC325079DFC967CD76CAA82C60EA60247B970BD603902305ED9A0DA97DF146F3
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
242
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
DATASHEET-VALVES MA9881.exe
Verdict:
Malicious activity
Analysis date:
2023-05-30 06:30:48 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 877922 Sample: DATASHEET-VALVES_MA9881.exe Startdate: 30/05/2023 Architecture: WINDOWS Score: 100 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 4 other signatures 2->53 7 DATASHEET-VALVES_MA9881.exe 6 2->7         started        11 PSwtQO.exe 4 2->11         started        process3 file4 31 C:\Users\user\AppData\Roaming\PSwtQO.exe, PE32 7->31 dropped 33 C:\Users\user\...\PSwtQO.exe:Zone.Identifier, ASCII 7->33 dropped 35 C:\Users\user\AppData\Local\...\tmp7B05.tmp, XML 7->35 dropped 55 Detected unpacking (changes PE section rights) 7->55 57 Detected unpacking (overwrites its own PE header) 7->57 59 Uses schtasks.exe or at.exe to add and modify task schedules 7->59 67 3 other signatures 7->67 13 RegSvcs.exe 15 3 7->13         started        17 powershell.exe 21 7->17         started        19 schtasks.exe 1 7->19         started        61 Antivirus detection for dropped file 11->61 63 Multi AV Scanner detection for dropped file 11->63 65 Machine Learning detection for dropped file 11->65 21 RegSvcs.exe 3 11->21         started        23 schtasks.exe 1 11->23         started        signatures5 process6 dnsIp7 37 api4.ipify.org 64.185.227.155, 443, 49700, 49701 WEBNXUS United States 13->37 39 api.ipify.org 13->39 69 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 13->69 71 May check the online IP address of the machine 13->71 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        41 smtp.yandex.ru 77.88.21.158, 49702, 587 YANDEXRU Russian Federation 21->41 43 192.168.2.1 unknown unknown 21->43 45 2 other IPs or domains 21->45 73 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->73 75 Tries to steal Mail credentials (via file / registry access) 21->75 77 Tries to harvest and steal ftp login credentials 21->77 79 2 other signatures 21->79 29 conhost.exe 23->29         started        signatures8 process9
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-30 05:54:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
21 of 37 (56.76%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
AgentTesla
Unpacked files
SH256 hash:
0cc72caa29d5c4121dc907175336b5c17b7f63394a99c577b457e9955b1a02e7
MD5 hash:
224dd92c1e77728e5c1c72c9d805df7c
SHA1 hash:
ebf8cdc313a680ed1f7cccd6ccf8649253cdc375
SH256 hash:
68a43aaca5ebbceaab2d426b77c28c15ef77460f1250452a8925a0d456cee3a3
MD5 hash:
61cb66e6b5c4c4838d54ec3d142dc699
SHA1 hash:
ca49a359c0ed05dd0dbc3c5efcb86f72b6b83a8c
SH256 hash:
0b861d0e19d173621dba77fc3954b6325b3e89e0856817eb9ac1b0e4b4b6f9a0
MD5 hash:
34e9924238cc9c184aed0f7e0dd905ab
SHA1 hash:
42e0e3852a327ae2d232858ba41fca9cadd628db
SH256 hash:
b52c29ba9ef8996bdf721950d900db96f1befb9883eb38c2075528e60c7aabd4
MD5 hash:
7b6143d9d94c8b80d191b77d8b6d1ba2
SHA1 hash:
1c91704ff6da2a9dd8aaa2ff2d5a5f69a445f76b
SH256 hash:
83311d05b5263b0c8cb8f264584d823d1eb95175322c7dcc13877ae13351775a
MD5 hash:
0f4c6aa4deb8a10bb9438bdd075aeb72
SHA1 hash:
71a4ac7bc37db6b784f1a73f5eec67b29e1e0948
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 83311d05b5263b0c8cb8f264584d823d1eb95175322c7dcc13877ae13351775a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments