MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98b85ee0663117740bdac3c6af9fd2c637206f83be0978b865bc9cce1cc2eb51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 16 File information Comments

SHA256 hash: 98b85ee0663117740bdac3c6af9fd2c637206f83be0978b865bc9cce1cc2eb51
SHA3-384 hash: b5930adcc8ccbba3afbb57e0a9a29546b2b54e7e6d4b1a278a6fad2e1948762cbee76a3e5c378f0342c8e569b964512a
SHA1 hash: 643627151448795c6d296cc2c9c5be59937da4d9
MD5 hash: f17de52fcf8876fe0f7dfe27938821ad
humanhash: oxygen-virginia-mirror-violet
File name:SecuriteInfo.com.Heur.32701.20065
Download: download sample
Signature AgentTesla
File size:801'792 bytes
First seen:2024-04-30 00:30:49 UTC
Last seen:2024-04-30 07:33:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:QlPmicd0uitF0I/tI6WHft8xjmq5c30l:QluicdaWHl8xy/k
Threatray 612 similar samples on MalwareBazaar
TLSH T14B052351718ACCA3C87CC7F9CC5A901287BB3257EFB2E1AF4448719A61D7B809752AD3
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
5
# of downloads :
431
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
98b85ee0663117740bdac3c6af9fd2c637206f83be0978b865bc9cce1cc2eb51.exe
Verdict:
Malicious activity
Analysis date:
2024-04-30 00:33:47 UTC
Tags:
smtp exfiltration stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Sending an HTTP GET request
Setting a keyboard event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1433779 Sample: SecuriteInfo.com.Heur.32701... Startdate: 30/04/2024 Architecture: WINDOWS Score: 100 66 mail.starmech.net 2->66 68 api.ipify.org 2->68 80 Found malware configuration 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Sigma detected: Scheduled temp file as task from temp location 2->84 86 11 other signatures 2->86 8 SecuriteInfo.com.Heur.32701.20065.exe 7 2->8         started        12 tNRjyjsAFX.exe 5 2->12         started        14 BjTxJte.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 58 C:\Users\user\AppData\...\tNRjyjsAFX.exe, PE32 8->58 dropped 60 C:\Users\user\AppData\Local\...\tmpA59B.tmp, XML 8->60 dropped 102 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->102 104 Uses schtasks.exe or at.exe to add and modify task schedules 8->104 106 Adds a directory exclusion to Windows Defender 8->106 19 SecuriteInfo.com.Heur.32701.20065.exe 16 5 8->19         started        24 powershell.exe 23 8->24         started        36 2 other processes 8->36 108 Multi AV Scanner detection for dropped file 12->108 110 Machine Learning detection for dropped file 12->110 112 Injects a PE file into a foreign processes 12->112 26 tNRjyjsAFX.exe 12->26         started        28 schtasks.exe 12->28         started        30 BjTxJte.exe 14->30         started        32 schtasks.exe 14->32         started        62 192.168.2.4, 138, 443, 49197 unknown unknown 16->62 64 239.255.255.250 unknown Reserved 16->64 34 BjTxJte.exe 16->34         started        38 2 other processes 16->38 file6 signatures7 process8 dnsIp9 70 mail.starmech.net 207.174.215.249, 49734, 49738, 49759 PUBLIC-DOMAIN-REGISTRYUS United States 19->70 72 api.ipify.org 172.67.74.152, 443, 49733, 49737 CLOUDFLARENETUS United States 19->72 54 C:\Users\user\AppData\Roaming\...\BjTxJte.exe, PE32 19->54 dropped 56 C:\Users\user\...\BjTxJte.exe:Zone.Identifier, ASCII 19->56 dropped 88 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->88 90 Tries to steal Mail credentials (via file / registry access) 19->90 92 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->92 94 Loading BitLocker PowerShell Module 24->94 40 conhost.exe 24->40         started        42 WmiPrvSE.exe 24->42         started        44 conhost.exe 28->44         started        46 conhost.exe 32->46         started        96 Tries to harvest and steal ftp login credentials 34->96 98 Tries to harvest and steal browser information (history, passwords, etc) 34->98 100 Installs a global keyboard hook 34->100 48 conhost.exe 36->48         started        50 conhost.exe 36->50         started        74 www.google.com 142.250.191.164, 443, 49741, 49742 GOOGLEUS United States 38->74 76 172.217.1.110, 443, 49776 GOOGLEUS United States 38->76 78 5 other IPs or domains 38->78 52 conhost.exe 38->52         started        file10 signatures11 process12
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-04-29 23:17:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
60c27c62161f259b277cb895d143170564c38a647c37be0ed356c456d9038e9b
MD5 hash:
a5b096a31e6d15b5005042d053d66f8d
SHA1 hash:
e3ecde4f2f9decee54061208693b99fa5eb88b32
SH256 hash:
44e08dc0addf10f4e99661df9a9876ae5489e68108058f0fc94c1d5feaaae277
MD5 hash:
0161c9f57872a218bcf329a1d5981667
SHA1 hash:
d60c82e9762abe0e2db450caa9ee0fd25270d829
SH256 hash:
ab737fa94d5638dc23955700ae5443fa7a05882c821c51b995935a91e42c3561
MD5 hash:
8ae00a26ba2f9f1d519fd6455db2cb4d
SHA1 hash:
9270d95cc7f7a8d1915de694d54a550b3c683684
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
e1c622628bd86d1d3e801afb5dee83b551d223f281e937e17529190d67c2e6ae
MD5 hash:
596ff23b412ac2abc3e5c178558eacfb
SHA1 hash:
8476916e82f85f77ff4cb066110d3a14a5da67ee
SH256 hash:
98b85ee0663117740bdac3c6af9fd2c637206f83be0978b865bc9cce1cc2eb51
MD5 hash:
f17de52fcf8876fe0f7dfe27938821ad
SHA1 hash:
643627151448795c6d296cc2c9c5be59937da4d9
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Generic_Threat_9f4a80b2
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 98b85ee0663117740bdac3c6af9fd2c637206f83be0978b865bc9cce1cc2eb51

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments