MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 93bc8b052ab504548c2bd80aad36a2c4ebea09d06db56dbaedf16109da7daf5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 93bc8b052ab504548c2bd80aad36a2c4ebea09d06db56dbaedf16109da7daf5c
SHA3-384 hash: 2b8597f090f7b5543f01d8fd4554163552ffd4a439eed14833d4a290647913e9b93b274824760604516c1c1eaca67f92
SHA1 hash: 7bfcb5006685d01c48cf9d9d2685b709f5413009
MD5 hash: 229cdabf77106b1ff5da43ee6c78fdc0
humanhash: jupiter-mexico-sweet-cardinal
File name:Purchase Order RFQ#23-0616.exe
Download: download sample
Signature AgentTesla
File size:600'576 bytes
First seen:2023-05-18 22:31:47 UTC
Last seen:2023-05-20 15:20:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:nYiv5hW923fardrj+80svv4XbMHLc1msHJNCvZa+oo9guZz7:BecvI+8Hvv4v17JNWZPoOh
Threatray 1'435 similar samples on MalwareBazaar
TLSH T196D4D07060DE4A90E01ECBF179B8FD72033174F3A9D9D9750B65A1C4CE2AF506E88A5B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter threatcat_ch
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Purchase Order RFQ#23-0616.exe
Verdict:
Malicious activity
Analysis date:
2023-05-18 22:34:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
86%
Tags:
lolbin packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to register a low level keyboard hook
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 869469 Sample: Purchase_Order_RFQ#23-0616.exe Startdate: 19/05/2023 Architecture: WINDOWS Score: 100 64 us2.smtp.mailhostbox.com 2->64 66 smtp.aabaag.com 2->66 78 Found malware configuration 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 Sigma detected: Scheduled temp file as task from temp location 2->82 84 7 other signatures 2->84 8 Purchase_Order_RFQ#23-0616.exe 7 2->8         started        12 fGipWFuWqCnCWQ.exe 5 2->12         started        14 VzKCUwk.exe 5 2->14         started        16 VzKCUwk.exe 2->16         started        signatures3 process4 dnsIp5 54 C:\Users\user\AppData\...\fGipWFuWqCnCWQ.exe, PE32 8->54 dropped 56 C:\...\fGipWFuWqCnCWQ.exe:Zone.Identifier, ASCII 8->56 dropped 58 C:\Users\user\AppData\Local\...\tmpAEBE.tmp, XML 8->58 dropped 60 C:\...\Purchase_Order_RFQ#23-0616.exe.log, ASCII 8->60 dropped 96 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->96 98 Contains functionality to register a low level keyboard hook 8->98 100 Uses schtasks.exe or at.exe to add and modify task schedules 8->100 102 Adds a directory exclusion to Windows Defender 8->102 19 Purchase_Order_RFQ#23-0616.exe 2 10 8->19         started        24 powershell.exe 21 8->24         started        26 schtasks.exe 1 8->26         started        104 Multi AV Scanner detection for dropped file 12->104 106 Machine Learning detection for dropped file 12->106 108 Injects a PE file into a foreign processes 12->108 28 fGipWFuWqCnCWQ.exe 12->28         started        30 schtasks.exe 12->30         started        32 VzKCUwk.exe 14->32         started        34 schtasks.exe 14->34         started        62 192.168.2.1 unknown unknown 16->62 36 VzKCUwk.exe 16->36         started        38 schtasks.exe 16->38         started        file6 signatures7 process8 dnsIp9 68 us2.smtp.mailhostbox.com 208.91.199.224, 49717, 49718, 49720 PUBLIC-DOMAIN-REGISTRYUS United States 19->68 70 smtp.aabaag.com 19->70 50 C:\Users\user\AppData\Roaming\...\VzKCUwk.exe, PE32 19->50 dropped 52 C:\Users\user\...\VzKCUwk.exe:Zone.Identifier, ASCII 19->52 dropped 86 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->86 88 Tries to steal Mail credentials (via file / registry access) 19->88 90 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->90 40 conhost.exe 24->40         started        42 conhost.exe 26->42         started        44 conhost.exe 30->44         started        72 208.91.199.223, 49721, 587 PUBLIC-DOMAIN-REGISTRYUS United States 32->72 74 smtp.aabaag.com 32->74 46 conhost.exe 34->46         started        76 smtp.aabaag.com 36->76 92 Tries to harvest and steal browser information (history, passwords, etc) 36->92 94 Installs a global keyboard hook 36->94 48 conhost.exe 38->48         started        file10 signatures11 process12
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-16 10:45:45 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
16c255190eaaf1b60ec7d07abcac5f614ea197cee2416ca9d01bb563c526c87d
MD5 hash:
fb4ed205b442f470bbf10913128efdcb
SHA1 hash:
9a0a4c5ae429769e3253a9a3daefa24270b87a5b
SH256 hash:
79989085c8a0fb769f536edfe259f7ccf536fad09aa240e4c136aac2290ca442
MD5 hash:
6b1ac4c8ba613c481c1e4dd05e3999a8
SHA1 hash:
8f41a40f835e1cbc99d339e5562e2b5b10f66a91
SH256 hash:
a7485443b331c2fca54197f53638cb11a8c82bac339b66f35b95d0ad0aceb438
MD5 hash:
dfca41d2838170cb07ef445bb7d9c987
SHA1 hash:
7622672bed23f065cafdf2a17879ebf5926aba8b
SH256 hash:
3326310b67833574f65749357ac58e2a1049853514bedb18fac3b2dd22fcbbab
MD5 hash:
b508ad5385a979580163d5b1256734db
SHA1 hash:
5686c535b1b3c1669aa27cd3971a2bc66353aba4
SH256 hash:
70283da7e77bf4a5298fd0a9a6d936ec3e61c161dbdd4c1cad252f3ec9da50cc
MD5 hash:
7a56c7db349e0cefdcccbec51e193ede
SHA1 hash:
46ba04e30017235209de2e9171ea73a358a5e61e
Detections:
AgentTeslaXorStringsNet
SH256 hash:
93bc8b052ab504548c2bd80aad36a2c4ebea09d06db56dbaedf16109da7daf5c
MD5 hash:
229cdabf77106b1ff5da43ee6c78fdc0
SHA1 hash:
7bfcb5006685d01c48cf9d9d2685b709f5413009
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 93bc8b052ab504548c2bd80aad36a2c4ebea09d06db56dbaedf16109da7daf5c

(this sample)

  
Dropped by
agenttesla
  
Delivery method
Distributed via e-mail attachment

Comments