MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 903ea42c02e8a30f6ad63666de0748b4fd4c2758c220b39af57269d1eebebb9d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 903ea42c02e8a30f6ad63666de0748b4fd4c2758c220b39af57269d1eebebb9d
SHA3-384 hash: d4f7ad4e736aab4135b9984cb6ca247e9f0b4642b2813da611a0748795e73d4b314f8274dcd996291cd5e84ac68a1af6
SHA1 hash: 75daa6a232a21e8be184a9cfb1a1d1b56350aa65
MD5 hash: d2dfae510841f26b52b3c64f97ae1f36
humanhash: hydrogen-sixteen-angel-floor
File name:Invoice # 10623-27.exe
Download: download sample
Signature AgentTesla
File size:643'072 bytes
First seen:2023-06-23 09:45:17 UTC
Last seen:2023-06-26 07:08:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:C2iNG4/mNUAV0NCCVYb+9cH4/LhXVebnI+s7Xlmalce1NiQi:C1M4/QUNVYC9cK90bIfLlmz
Threatray 4'020 similar samples on MalwareBazaar
TLSH T139D4017A12A00A14F57EAFF570B48064C3B6BA909B12F22A7FF520F51272F415E1776B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter cocaman
Tags:AgentTesla exe INVOICE methobsindia-com

Intelligence


File Origin
# of uploads :
3
# of downloads :
308
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Invoice # 10623-27.exe
Verdict:
Malicious activity
Analysis date:
2023-06-23 09:46:11 UTC
Tags:
rat agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Unauthorized injection to a recently created process
Creating a file
Using the Windows Management Instrumentation requests
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2023-06-23 08:20:45 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
19 of 24 (79.17%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
9d6c73e273a966a4ed1d93350392d965792ddf5ad201bfa28b8adcec2e344db5
MD5 hash:
adac60763fcfe4d5f4ad323046e79500
SHA1 hash:
9ced772a90ddec9fffde8c745225ad289f3f087e
SH256 hash:
e8473f398d935b7e41d5537e7cb1c8b4694f8f998bb068c162eb6938fbb72919
MD5 hash:
19efb57a57a045dd665f5953188dfeb4
SHA1 hash:
600272de478b79730f4a49983e30e3dfe4889126
Detections:
AgentTeslaXorStringsNet
Parent samples :
8668cd0f536fc0fb2d750d9d4ed492ac9435a32b7ade9f3e427af470bab09bf9
f2927830e4233d9249db711122cafe8f85bf91afa44409b63aacf64b28176356
c4c9edf6afbb7299ed861464f6235508fe155c28df677fc2c25f7b2ff47d0131
c27a4d017b1886d697758f747979b46b1f2d6012ba043869d56b07afab0c88c9
85c5b8ce343047febb9f3313f1cde4e1a37dec4a776addf9d4d6db10758c290b
903ea42c02e8a30f6ad63666de0748b4fd4c2758c220b39af57269d1eebebb9d
6673285a97d7ef391c811a7372c1033ce8f117f8f15702782461ff4737636ce8
5527c6e95c67b38151fbbf6f5d18671d56c96f27f66981029c633a413e73d7b0
a66814d509d2386f2dcff674de026b092a29bb4851710954496fe95fb2df8356
ea36848fbd83564e724d8b4cfdd06f1763b6d6954928154d8d9715c6162432b6
f24d872f7b39540fc137f8e348c0aed12d0162bebaca879775ffecc9ac2acb9b
85516b5e6517acd4dc26d67b6ae16d9f8373eed6e33e858c0842dc2545eaa2fe
20ea3dddbca03383cb1f9fb410b0f354075c3a704e2c87233c2f21f4f0564910
aaaa03b6dc8192c88f0ca6a71ee589e09244af6e1a85e567e317c09b08842266
48e818e3ee1431371b9954e069559708501784ad1a8a88b58fae48adaf5d94c0
876aefee92ee7079d9b36fd7f8a2f236399491f91aac1acd02a6fe9f2e504fc1
b3cd9244d9b558968bf4b52e8c25a54b2b08a2d0e941c517e1c2d91be1e61e31
c7af3f3f01a34453516de99df2636838f245ef676e8673a8e42518c56d7dc9be
ff95e15474679698dd9c024cb00e3f6dd5af4cc0809c3a932f5e8f3aab47ace5
fc887e3b9f751251d19e139b44768b825879332a0a7419ba038cd758d92db53f
14cd4896eaacdfc8b02c8496fc9e589e7252e7a17979993d386247eef8932301
8b5a226b8ceaa34a62e53ad86616bbbd3c6b8f8644d36fe59bf390153f6946c5
dc7f9c2cbc0466c884b6fcfa3430a74b2e582446e4560133495cabb5ce05c940
6043022180880a41f1a49a0c9eeb4a81b151d14705d14409a96711ee65f40e24
SH256 hash:
f4e9748f34a473ef3d66634349bd92016cf81da2b64843dfe81afe61e8cfb557
MD5 hash:
04a9ff50ecaac1efb79be4459d684184
SHA1 hash:
5a728c1ab0bccbbbfa0d1c6334ba7ba3c5b3c628
SH256 hash:
0f4622d099c03775c8fd3a1c30593bd5643f6042ebf4c8afb5d538ecc675b472
MD5 hash:
c698aac61f403e25dd64331d2b59aee6
SHA1 hash:
4c4c58e0a0881d2201be5c3dab8cb82df1619482
SH256 hash:
903ea42c02e8a30f6ad63666de0748b4fd4c2758c220b39af57269d1eebebb9d
MD5 hash:
d2dfae510841f26b52b3c64f97ae1f36
SHA1 hash:
75daa6a232a21e8be184a9cfb1a1d1b56350aa65
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MSIL_SUSP_OBFUSC_XorStringsNet
Author:dr4k0nia
Description:Detects XorStringsNET string encryption, and other obfuscators derived from it
Reference:https://github.com/dr4k0nia/yara-rules
Rule name:msil_susp_obf_xorstringsnet
Author:dr4k0nia
Description:Detects XorStringsNET string encryption, and other obfuscators derived from it
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 903ea42c02e8a30f6ad63666de0748b4fd4c2758c220b39af57269d1eebebb9d

(this sample)

Comments