MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | 85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d |
|---|---|
| SHA3-384 hash: | f7c0d0835aec8d74247b0524a50a3afaf2d91ab62153c6bfe1d5b91cd2efad7046fd5642c9a9f02c83a8ade7473c42c7 |
| SHA1 hash: | 1c3847617eb8f75553128d2cdfa372d531646ba1 |
| MD5 hash: | 42173297d6593b53dcccba761d84c210 |
| humanhash: | michigan-april-snake-ten |
| File name: | products.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 616'448 bytes |
| First seen: | 2023-05-15 05:39:11 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger) |
| ssdeep | 12288:xo1M+mQZ5Vy0X0rNe6d94AqdylEy8WmrlhNHEYvR7mJzRSGOv65WzKj:Ka+m0H0rtrGocVhNHEY0JBOIV |
| Threatray | 3'507 similar samples on MalwareBazaar |
| TLSH | T1DFD4CE49623BBDD3D62806F1610038924B3DE11678F8F4FC6D9BB4C9C8DAB914BD52A7 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
274
Origin country :
CHVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
products.exe
Verdict:
Malicious activity
Analysis date:
2023-05-15 05:42:32 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
XorStringsNET
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Verdict:
Malicious
Threat level:
10/10
Confidence:
86%
Tags:
formbook packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected zgRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-11 08:55:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
21 of 37 (56.76%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 3'497 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
AgentTesla
Unpacked files
SH256 hash:
1cb0143fb91c98fa790059bbc2c889948029944cd9e7ae62efd0a83264031780
MD5 hash:
673d1515db6ad29a4634984e68085489
SHA1 hash:
be694bc3d654a20c873c8cc5f6ca6458c75c561f
Detections:
AgentTeslaXorStringsNet
Parent samples :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 hash:
5790f02b04be740d87ff63898101cd8d22c4ccfc18fa96016f629330a173c712
MD5 hash:
a390e61e5f2490ec4abd56a454652c8d
SHA1 hash:
a0d0547249f485bf1d0a14736a366c5e0e8548e2
SH256 hash:
c72ca892abebd8794a9544913d071c3c91356f5075509717727e180e87cb98ba
MD5 hash:
25383385b11436b817ed4dc0419f4e24
SHA1 hash:
9441f35f45a30503ebb2c717209f29341b5b48b6
SH256 hash:
42ff51f4dc572c178c94a7c1764376f996d6d89652cb2f0b2c9766f45ef277d0
MD5 hash:
4f5648af5b9f103c960ed3701195961f
SHA1 hash:
6a2754de310941cb78872f5565eca618468b1ad4
SH256 hash:
715f3abb174f6119cb662a0635f2704fa877d6e2b29ed7628e90267c4c620943
MD5 hash:
6732d493c16c2b7064e48d7aca6e0181
SHA1 hash:
0e5444bb510ab8087314848f25665669584dbee3
SH256 hash:
85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d
MD5 hash:
42173297d6593b53dcccba761d84c210
SHA1 hash:
1c3847617eb8f75553128d2cdfa372d531646ba1
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.61
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
agenttesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.