MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ba8416d095006be656b4b4e0eaa987cd84a5236641020ebaf22b0cdf08b24ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 17 File information Comments

SHA256 hash: 8ba8416d095006be656b4b4e0eaa987cd84a5236641020ebaf22b0cdf08b24ef
SHA3-384 hash: abfeebac7cbfd1d5504666226db8c6f4face055c3c4635e5611db5a6d573d7576694f1a4ea02e323e1cb78cdf9dda490
SHA1 hash: 185bb280cb0296e23e7f02d9d0c7247f375bd14c
MD5 hash: ba04c32bf6434c0f225eecebd3475cf1
humanhash: video-football-floor-equal
File name:Tracking - FedEx.exe
Download: download sample
Signature AgentTesla
File size:644'608 bytes
First seen:2023-12-12 07:47:45 UTC
Last seen:2023-12-12 09:20:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:KA3IU8S6eUdl0/+HjAfbSK4i892YTomuZn5lOyE85YDxIIqmoXM9vY3:K+ItSAdl0Asf7412uoBZ5lOZ8ODxDZ
Threatray 3'566 similar samples on MalwareBazaar
TLSH T114D423247EF46B21CE77C3F6856909A50BB8CA7A0476E7199CB4E0CF9439B005E93E17
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:AgentTesla exe FedEx

Intelligence


File Origin
# of uploads :
2
# of downloads :
301
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Tracking - FedEx.exe
Verdict:
Malicious activity
Analysis date:
2023-12-12 07:52:16 UTC
Tags:
evasion stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Setting a keyboard event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Telegram RAT
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1359809 Sample: Tracking_-_FedEx.exe Startdate: 12/12/2023 Architecture: WINDOWS Score: 100 27 api.telegram.org 2->27 29 ip-api.com 2->29 31 2 other IPs or domains 2->31 49 Snort IDS alert for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 57 10 other signatures 2->57 7 Tracking_-_FedEx.exe 3 2->7         started        10 gPBva.exe 3 2->10         started        12 gPBva.exe 2 2->12         started        signatures3 55 Uses the Telegram API (likely for C&C communication) 27->55 process4 signatures5 59 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->59 61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->61 63 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->63 65 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 7->65 14 Tracking_-_FedEx.exe 16 5 7->14         started        67 Antivirus detection for dropped file 10->67 69 Machine Learning detection for dropped file 10->69 71 Injects a PE file into a foreign processes 10->71 19 gPBva.exe 14 2 10->19         started        21 gPBva.exe 12->21         started        process6 dnsIp7 33 api4.ipify.org 64.185.227.156, 443, 49707, 49714 WEBNXUS United States 14->33 35 ip-api.com 208.95.112.1, 49709, 49716, 49726 TUT-ASUS United States 14->35 37 api.telegram.org 149.154.167.220, 443, 49710, 49713 TELEGRAMRU United Kingdom 14->37 23 C:\Users\user\AppData\Roaming\...\gPBva.exe, PE32 14->23 dropped 25 C:\Users\user\...\gPBva.exe:Zone.Identifier, ASCII 14->25 dropped 39 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->39 41 Tries to steal Mail credentials (via file / registry access) 14->41 43 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->43 45 Tries to harvest and steal browser information (history, passwords, etc) 21->45 47 Installs a global keyboard hook 21->47 file8 signatures9
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-12 07:48:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:agenttesla family:zgrat keylogger persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Detect ZGRat V1
ZGRat
Malware Config
C2 Extraction:
https://api.telegram.org/bot6758539156:AAFuj1E_hapWTLdEQ6zsa2582gFDEYNH-c8/
Unpacked files
SH256 hash:
797e57bd74a68f7b4808a213f5c319ee4f4b023bc73088175d4393dfee9fe329
MD5 hash:
3c927935fbd608e7628cc2c5ad7d52fd
SHA1 hash:
ee0c880c0614ac960fd641f7d479233584aed1d8
SH256 hash:
973f5a9ec5f0b0d7480abed620a992850e1bd92c0b04dd71ef9638cf154c7efe
MD5 hash:
84f0269f8074f4c2b847e07e69ccdd72
SHA1 hash:
d36dda84aba3366ef7405ac19fd3ffb25a98ef57
Detections:
win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
ac74b6323686a1559af60949f559ff4248b008b592f0a0bc8bc7bca56c5af51b
MD5 hash:
a040a3815da269207ec8617ef9659caa
SHA1 hash:
731f018aa62abc957a2e53fe9047ee3247b5d9f5
Detections:
MALWARE_Win_zgRAT
Parent samples :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 hash:
769c4c32fc078fcbc788ab5113ce4a4b1095175fe30521149954348114f71132
MD5 hash:
e4014e89808ea0ff94aa95bc8d05fdb6
SHA1 hash:
3120ee0e51024777209b0659362008428ceea41d
SH256 hash:
8ba8416d095006be656b4b4e0eaa987cd84a5236641020ebaf22b0cdf08b24ef
MD5 hash:
ba04c32bf6434c0f225eecebd3475cf1
SHA1 hash:
185bb280cb0296e23e7f02d9d0c7247f375bd14c
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifcats referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 8ba8416d095006be656b4b4e0eaa987cd84a5236641020ebaf22b0cdf08b24ef

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments