MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 93f290cc7d1addf57b72773a12b307ba5598c086339d176d9a24a641a7e69d08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 8
| SHA256 hash: | 93f290cc7d1addf57b72773a12b307ba5598c086339d176d9a24a641a7e69d08 |
|---|---|
| SHA3-384 hash: | b015e43e9540631f19a7fdac9b11ca845f48d31774277961aa3a0b771daf5ae15adaec1afed8ee7be3adc7a97d87f8d8 |
| SHA1 hash: | deaa4de8354cb139a85e8d95897327d9646f577f |
| MD5 hash: | 3b69d0e958c913caa6eefe2feb3d605a |
| humanhash: | king-hamper-hotel-mississippi |
| File name: | PO12172020.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 56'272 bytes |
| First seen: | 2020-12-17 08:41:36 UTC |
| Last seen: | 2020-12-17 10:29:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 768:rdDpPCWhN8NsZtbyHtLsIiCrbDgMa66i0LamROuUf2h4c/:rdlL5qtn7rbDTl6DLahuUfg/ |
| Threatray | 1'863 similar samples on MalwareBazaar |
| TLSH | F6430FD1AEF8865FC42EB33D16E93002BFB60D646A35CB5A5631356229D33845FDE80E |
| Reporter | |
| Tags: | AgentTesla exe |
abuse_ch
Malspam distributing unidentified malware:HELO: DS7920017.clientshostname.com
Sending IP: 185.180.198.68
From: Cyprus Sasnauskas <info@sales-z.net>
Subject: PO12142020
Attachment: PO12172020.zip (contains "PO12172020.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO12172020.exe
Verdict:
Malicious activity
Analysis date:
2020-12-17 09:39:44 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Behaviour
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Sending a TCP request to an infection source
Adding exclusions to Windows Defender
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Connects to a pastebin service (likely for C&C)
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell adding suspicious path to exclusion list
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2020-12-17 05:03:15 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 1'853 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion persistence spyware trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Maps connected drives based on registry
Checks BIOS information in registry
Drops startup file
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Modifies WinLogon for persistence
Modifies Windows Defender Real-time Protection settings
Windows security bypass
Turns off Windows Defender SpyNet reporting
Unpacked files
SH256 hash:
93f290cc7d1addf57b72773a12b307ba5598c086339d176d9a24a641a7e69d08
MD5 hash:
3b69d0e958c913caa6eefe2feb3d605a
SHA1 hash:
deaa4de8354cb139a85e8d95897327d9646f577f
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.