MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 86d0add359a099061caa3450bf91bed728623f2d574eeb80956e93bbc09733fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 86d0add359a099061caa3450bf91bed728623f2d574eeb80956e93bbc09733fb
SHA3-384 hash: 95443839f401051277b983a2f68157f952330d49b73ecbf62fa06d2b5c2a09d8a1920dad9cf7a0e348ee399bc120ae96
SHA1 hash: fad4ce4ac3bdd9c5cec62ff79212c4d4c11060c8
MD5 hash: 8d833561442e31437abd896cce1a4bef
humanhash: foxtrot-muppet-colorado-four
File name:InquiryNo 04032025.vbe
Download: download sample
Signature AgentTesla
File size:11'490 bytes
First seen:2025-03-04 15:53:03 UTC
Last seen:2025-03-04 16:41:19 UTC
File type:Visual Basic Script (vbe) vbe
MIME type:application/octet-stream
ssdeep 192:vh1qawSOYCLOih7flnbtxy3Q69I0yqVLXEcN+CCZOsDK:marOzL7hZbtxy3QOb1gcN+FG
TLSH T17E3234CCCE9B40CAEB2EA7895B86D7821F4F5A5D2B1F45C30D10C287172FA85A965F70
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika unknown
Reporter lowmal3
Tags:AgentTesla vbe

Intelligence


File Origin
# of uploads :
2
# of downloads :
92
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme shell lien
Result
Verdict:
UNKNOWN
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Potential evasive VBS script found (sleep loop)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: MSBuild connects to smtp port
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629365 Sample: InquiryNo 04032025.vbe Startdate: 04/03/2025 Architecture: WINDOWS Score: 100 38 shed.dual-low.s-part-0032.t-0009.t-msedge.net 2->38 40 s-part-0044.t-0009.fb-t-msedge.net 2->40 42 5 other IPs or domains 2->42 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 11 other signatures 2->56 8 wscript.exe 33 2 2->8         started        13 wscript.exe 1 2->13         started        signatures3 process4 dnsIp5 48 144.91.92.251, 49704, 80 CONTABODE Germany 8->48 36 C:\Users\user\AppData\...\AlikhxGEoopNnKx.vbs, ISO-8859 8->36 dropped 68 System process connects to network (likely due to code injection or exploit) 8->68 70 Suspicious powershell command line found 8->70 72 Wscript starts Powershell (via cmd or directly) 8->72 74 6 other signatures 8->74 15 powershell.exe 37 8->15         started        18 WmiPrvSE.exe 8->18         started        20 powershell.exe 42 13->20         started        file6 signatures7 process8 signatures9 22 MSBuild.exe 15 2 15->22         started        26 conhost.exe 15->26         started        28 wermgr.exe 15->28         started        76 Writes to foreign memory regions 20->76 78 Injects a PE file into a foreign processes 20->78 30 MSBuild.exe 2 20->30         started        32 conhost.exe 20->32         started        34 wermgr.exe 20->34         started        process10 dnsIp11 44 api.ipify.org 104.26.12.205, 443, 49705, 49706 CLOUDFLARENETUS United States 22->44 58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 22->58 46 162.254.34.31, 49709, 587 VIVIDHOSTINGUS United States 30->46 60 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 30->60 62 Tries to steal Mail credentials (via file / registry access) 30->62 64 Tries to harvest and steal ftp login credentials 30->64 66 Tries to harvest and steal browser information (history, passwords, etc) 30->66 signatures12
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-04 13:19:30 UTC
File Type:
Binary
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in System32 directory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Visual Basic Script (vbe) vbe 86d0add359a099061caa3450bf91bed728623f2d574eeb80956e93bbc09733fb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments