MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Expiro
Vendor detections: 16
| SHA256 hash: | 9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b |
|---|---|
| SHA3-384 hash: | 16da6ae6642b5956e55ef2295f69b5f58fff96f1af359a589d4cbb9e262db489aacc97eb69864d51fb38bef1b7f4d4e1 |
| SHA1 hash: | 0d888453df23f50c61abbc8f2216d2fbe986716e |
| MD5 hash: | eb8d251c25ab63697fb69a403af0f09f |
| humanhash: | uranus-lake-arizona-delta |
| File name: | Order SMG 201906 20190816order.pdf.scr |
| Download: | download sample |
| Signature | Expiro |
| File size: | 2'267'648 bytes |
| First seen: | 2024-11-28 05:39:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger) |
| ssdeep | 24576:ktb20p1aCqT5TBWgNQ7aFPXgTcE4K6O6Y22yGhfP+3YR5Qwcb6A2sqjnhMgeiCln:N6g5tQ7aFfarFYY3lu56Dmg27RnWGj |
| Threatray | 1'459 similar samples on MalwareBazaar |
| TLSH | T179A5012263DD8361C3B25273BA5AB741AE7B7C2546B0F96B2FD4093DF820161425FA73 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10522/11/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe Expiro |
Intelligence
File Origin
# of uploads :
1
# of downloads :
445
Origin country :
CHVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Order SMG 201906 20190816order.pdf.scr
Verdict:
Malicious activity
Analysis date:
2024-11-28 05:42:08 UTC
Tags:
expiro sinkhole autoit m0yv netreactor
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
99.9%
Tags:
autorun autoit emotet expiro
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Creating a window
Launching a service
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Modifying a system executable file
Connection attempt to an infection source
Launching a process
Loading a system driver
Modifying a system file
Enabling autorun for a service
Query of malicious DNS domain
Enabling autorun with the shell\open\command registry branches
Infecting executable files
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit cmd compiled-script evasive fingerprint keylogger lolbin masquerade microsoft_visual_cc packed packed packer_detected
Verdict:
Malicious
Labled as:
Expiro.Generic
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla, MassLogger RAT, PureLog Stea
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates files in the system32 config directory
Drops executable to a common third party application directory
Drops VBS files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes data at the end of the disk (often used by bootkits to hide malicious code)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Virus.Expiro
Status:
Malicious
First seen:
2024-11-27 20:50:28 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
32 of 38 (84.21%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
expiro
Similar samples:
+ 1'449 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection discovery execution keylogger spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
AutoIT Executable
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Verdict:
Malicious
Tags:
trojan expiro
YARA:
Windows_Virus_Expiro_84e99ff0
Unpacked files
SH256 hash:
abdd6f31a909b0b10e30ced74a1f6f037adf1f61a8a842048dbc254d6f076169
MD5 hash:
c33a7f0e25bb3f4d3c19fc8441e9d12b
SHA1 hash:
0286b277e97b9f7c217a0d029e8144f8e20b40b9
SH256 hash:
a2313a55d0d0db1d0d1b111960452aced849e134d44ce722dd194f62532bff45
MD5 hash:
34bc8b524cb60045cac0941cdd947ad5
SHA1 hash:
86a028a6c53520a4ea2f792d88a93f2b3f47d87f
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
RedLine_Campaign_June2021
SH256 hash:
36fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
MD5 hash:
50d015016f20da0905fd5b37d7834823
SHA1 hash:
6c39c84acf3616a12ae179715a3369c4e3543541
SH256 hash:
53406cb7d67e3d71e30ad41aff5a31b75652624a8641e0ea05f31650abd3fe42
MD5 hash:
d49b97c9900da1344e4e8481551cc14c
SHA1 hash:
53c7014eb195741a40b1d8ca061945fde2aa567f
Detections:
win_masslogger_w0
win_404keylogger_g1
INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
MAL_Envrial_Jan18_1
INDICATOR_SUSPICIOUS_Binary_References_Browsers
SH256 hash:
dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
MD5 hash:
d6a4cf0966d24c1ea836ba9a899751e5
SHA1 hash:
392d68c000137b8039155df6bb331d643909e7e7
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
e3fae1b80b581643c61c2d313c825bf7916a686d07cdcbd4debcc9dc8041777c
MD5 hash:
acfa49fcbfae41d1ce5208e85a74d18f
SHA1 hash:
344b938b758ffcdc9c0fd63cc9591f1ee8272472
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f9dd3e52640fc892ef50c0d7e14d9e1e2041ab64dc93b8e8f72be6cc82da042f
MD5 hash:
9ef2f2e3cd1d0a2340a52fc395537209
SHA1 hash:
ce0d6751f65ac84f7843c15f7b6792dae31c8b3f
Detections:
MAL_Malware_Imphash_Mar23_1
MALWARE_Win_RedLine
SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
40869912792e09b180c4d40b84b20677054597b2416ad83c4b0f1243e2b60ed7
MD5 hash:
299fb7f20de2c8e12dec1102b4facf83
SHA1 hash:
c019cb04b5521e1a7c195a55524feb1ffa1715aa
Detections:
AutoIT_Compiled
SH256 hash:
9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b
MD5 hash:
eb8d251c25ab63697fb69a403af0f09f
SHA1 hash:
0d888453df23f50c61abbc8f2216d2fbe986716e
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.