MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d
SHA3-384 hash: f7c0d0835aec8d74247b0524a50a3afaf2d91ab62153c6bfe1d5b91cd2efad7046fd5642c9a9f02c83a8ade7473c42c7
SHA1 hash: 1c3847617eb8f75553128d2cdfa372d531646ba1
MD5 hash: 42173297d6593b53dcccba761d84c210
humanhash: michigan-april-snake-ten
File name:products.exe
Download: download sample
Signature AgentTesla
File size:616'448 bytes
First seen:2023-05-15 05:39:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger)
ssdeep 12288:xo1M+mQZ5Vy0X0rNe6d94AqdylEy8WmrlhNHEYvR7mJzRSGOv65WzKj:Ka+m0H0rtrGocVhNHEY0JBOIV
Threatray 3'507 similar samples on MalwareBazaar
TLSH T1DFD4CE49623BBDD3D62806F1610038924B3DE11678F8F4FC6D9BB4C9C8DAB914BD52A7
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter threatcat_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
274
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
products.exe
Verdict:
Malicious activity
Analysis date:
2023-05-15 05:42:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
86%
Tags:
formbook packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected zgRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-11 08:55:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
21 of 37 (56.76%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
AgentTesla
Unpacked files
SH256 hash:
5790f02b04be740d87ff63898101cd8d22c4ccfc18fa96016f629330a173c712
MD5 hash:
a390e61e5f2490ec4abd56a454652c8d
SHA1 hash:
a0d0547249f485bf1d0a14736a366c5e0e8548e2
SH256 hash:
c72ca892abebd8794a9544913d071c3c91356f5075509717727e180e87cb98ba
MD5 hash:
25383385b11436b817ed4dc0419f4e24
SHA1 hash:
9441f35f45a30503ebb2c717209f29341b5b48b6
SH256 hash:
42ff51f4dc572c178c94a7c1764376f996d6d89652cb2f0b2c9766f45ef277d0
MD5 hash:
4f5648af5b9f103c960ed3701195961f
SHA1 hash:
6a2754de310941cb78872f5565eca618468b1ad4
SH256 hash:
715f3abb174f6119cb662a0635f2704fa877d6e2b29ed7628e90267c4c620943
MD5 hash:
6732d493c16c2b7064e48d7aca6e0181
SHA1 hash:
0e5444bb510ab8087314848f25665669584dbee3
SH256 hash:
85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d
MD5 hash:
42173297d6593b53dcccba761d84c210
SHA1 hash:
1c3847617eb8f75553128d2cdfa372d531646ba1
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 85f7d296de25155108c48bafa42ddcba37feb9add3f20c3b5c65ac321ec9a70d

(this sample)

  
Dropped by
agenttesla
  
Delivery method
Distributed via e-mail attachment

Comments