MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8412cec351eb6eee2f3c66ef6567a80e828a86ad904d41753b4510ef068e5c50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 5 File information Comments

SHA256 hash: 8412cec351eb6eee2f3c66ef6567a80e828a86ad904d41753b4510ef068e5c50
SHA3-384 hash: a9c953a9e8cc07f9074a659bd127740cb5ba62caa109abe771f09163ac61a5208547e542e2708eeee8a6e739b47201b2
SHA1 hash: 7146917ad7a934af85ad1076770c95d036503ff0
MD5 hash: b04586028fe45cbf4d0b3d981040b9d9
humanhash: october-emma-skylark-angel
File name:New PO 24072024 pdf.exe
Download: download sample
Signature AgentTesla
File size:589'312 bytes
First seen:2024-08-08 13:49:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 21371b611d91188d602926b15db6bd48 (60 x Formbook, 23 x AgentTesla, 20 x RemcosRAT)
ssdeep 12288:FsHzOUNUSB/o5LsI1uwajJ5yvv1l2vAOy0pUwz9339qRJEIVj1:8iUmSB/o5d1ubcvki0pUwz9YRJEEp
Threatray 3'530 similar samples on MalwareBazaar
TLSH T155C4229295C2CC89D22633B5D47D8DF184A17570AE953FBA4760F7AF6831342C81BB2E
TrID 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.9% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter ngokoptmp
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
394
Origin country :
ID ID
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
New PO 24072024 pdf.exe
Verdict:
Malicious activity
Analysis date:
2024-08-08 13:50:23 UTC
Tags:
evasion stealer ftp agenttesla exfiltration

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Stealth Autoit
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Reading critical registry keys
Connection attempt to an infection source
Stealing user critical data
Query of malicious DNS domain
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autoit infostealer lolbin microsoft_visual_cc packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-07-24 00:52:48 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla credential_access discovery keylogger spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
Looks up external IP address via web service
UPX packed file
Credentials from Password Stores: Credentials from Web Browsers
AgentTesla
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
77fd58789cadf2f53c7a9ee50f3a80baafb6fb8d7567afb4d66c081fef0857d4
MD5 hash:
a5e2d8aa014a6348667249b07e55fdce
SHA1 hash:
8406c6463a6a02aa82e399721ff3044d2d3b6e04
Detections:
win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 MALWARE_Win_AgentTeslaV2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
d7adf0fc3db563119c72aff8291b16282a674ea10898e7947cfd0cf60e5e778e
MD5 hash:
70e49b0dc3c2726dde6e1a15fc2ba104
SHA1 hash:
bfcafff01f6feea75f3b691b534955359b200e88
Detections:
AutoIT_Compiled
SH256 hash:
8412cec351eb6eee2f3c66ef6567a80e828a86ad904d41753b4510ef068e5c50
MD5 hash:
b04586028fe45cbf4d0b3d981040b9d9
SHA1 hash:
7146917ad7a934af85ad1076770c95d036503ff0
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_detect_tls_callbacks
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_3
Author:Kevin Falcoz
Description:UPX 3.X
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetAce
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments