MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89e465473b332066cb1594e043789743fcc5163df886b230d70be7527341a4b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 89e465473b332066cb1594e043789743fcc5163df886b230d70be7527341a4b8
SHA3-384 hash: d0b2b1e95d5d6473b0ec6ffcfb5f14dc85409ee07f2e0c5cef0369e1eb5c3490a39b95ad7d45fe68f009608e66af76f7
SHA1 hash: 11c76a8389a4b19a7dad50269eeaba2aef23e249
MD5 hash: abd8f92ab159f97900d53a0c10c9cba3
humanhash: alabama-finch-video-five
File name:Doc_2022060201111111.pdf.exe
Download: download sample
Signature AgentTesla
File size:1'399'808 bytes
First seen:2022-06-02 05:33:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger)
ssdeep 24576:V+5z1AGjnZAtpcB0klNgEdmdaVT/t0z9n6y8RYo+puvq121:G0Vk9k8y8r+p
Threatray 17'642 similar samples on MalwareBazaar
TLSH T1FF55170063EA5905FAFA5F79A972A5404BB77DDA6839C34F18CD50CE1FA3B808951B33
TrID 64.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.5% (.SCR) Windows screen saver (13101/52/3)
9.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.9% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter GovCERT_CH
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Doc_2022060201111111.pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-06-02 05:35:00 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 637997 Sample: Doc_2022060201111111.pdf.exe Startdate: 02/06/2022 Architecture: WINDOWS Score: 100 34 _kerberos._tcp.dc._msdcs.kursat.com.tr 2->34 40 Snort IDS alert for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 10 other signatures 2->46 8 Doc_2022060201111111.pdf.exe 7 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\Roaming26eodowcm.exe, PE32 8->26 dropped 28 C:\Users\...28eodowcm.exe:Zone.Identifier, ASCII 8->28 dropped 30 C:\Users\user\AppData\Local\...\tmpCA86.tmp, XML 8->30 dropped 32 C:\Users\...\Doc_2022060201111111.pdf.exe.log, ASCII 8->32 dropped 48 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->48 50 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 8->50 52 Uses schtasks.exe or at.exe to add and modify task schedules 8->52 54 2 other signatures 8->54 12 Doc_2022060201111111.pdf.exe 2 8->12         started        16 powershell.exe 24 8->16         started        18 schtasks.exe 1 8->18         started        20 Doc_2022060201111111.pdf.exe 8->20         started        signatures6 process7 dnsIp8 36 mail.kursat.com.tr 212.58.3.62, 49745, 587 DORUKNETTR Turkey 12->36 38 192.168.2.1 unknown unknown 12->38 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->56 58 Tries to steal Mail credentials (via file / registry access) 12->58 60 Tries to harvest and steal ftp login credentials 12->60 62 Tries to harvest and steal browser information (history, passwords, etc) 12->62 22 conhost.exe 16->22         started        24 conhost.exe 18->24         started        signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-06-02 04:02:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
suricata: ET MALWARE AgentTesla Exfil Via SMTP
Unpacked files
SH256 hash:
fac1d8a2543bf69a63a4575bfa76f6317b49e197475312d7eebb2b791bd7497e
MD5 hash:
f198f94cac1b8b470fdc9cfdfd467cd8
SHA1 hash:
f7f2a91de2f1a9ff398a0d3412a7d30a3f966861
SH256 hash:
0bf23055b166354d5aee2d513dfbbcab91873048484313705d63b504b738212f
MD5 hash:
15035f30f612437a542bb7878689acd8
SHA1 hash:
c4de8d743c6b294ea4cde6dc51973d62871e8cf7
SH256 hash:
e462d7121a0fc4dadd889aa40fe6a306f7ca480cc3c5dc14901b7b45547bec2d
MD5 hash:
b1e78edcc6b4e8a830c5c5c6ea4247a9
SHA1 hash:
a65d57547b4dc28cd2c8eee2cc2426f91300858d
SH256 hash:
879c29560b21be7d9b69ca27ca4756df86e080fa3e34cb191aad5cb1e5f05504
MD5 hash:
30b6a54a992eae921a2eb8c5ea130911
SHA1 hash:
1c83f0319bffe007077c6656418c9b7344d5affe
SH256 hash:
89e465473b332066cb1594e043789743fcc5163df886b230d70be7527341a4b8
MD5 hash:
abd8f92ab159f97900d53a0c10c9cba3
SHA1 hash:
11c76a8389a4b19a7dad50269eeaba2aef23e249
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 89e465473b332066cb1594e043789743fcc5163df886b230d70be7527341a4b8

(this sample)

  
Dropped by
agenttesla
  
Delivery method
Distributed via e-mail attachment

Comments