MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee
SHA3-384 hash: 4bb711718654abdee6c338933f139e80fefcfa87e59be93d925b3c3640977b7d3f758afb2446e677a3e1b40886d90e96
SHA1 hash: 9a562efcf54e0e912ead4610de76a065d732eeab
MD5 hash: d45152a4b8d2922dfa7dfda2c70cff1a
humanhash: bakerloo-hot-mirror-papa
File name:Our order.exe
Download: download sample
Signature AgentTesla
File size:890'880 bytes
First seen:2022-12-06 17:54:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:ucNUejKUYkD75gIFOxz0Z4e0vCCGHO8oswKp3WtjmahgKZ/nXt7virmWhlGLaQYI:FNlrYk2IFCz/FCO8rwY32
Threatray 23'811 similar samples on MalwareBazaar
TLSH T1EB15F71F4ED796C4EE3757F472458BB83EA2BB81A8615C056CA0B073007C53DAB3EA65
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
190
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Our order.exe
Verdict:
Malicious activity
Analysis date:
2022-12-06 17:57:57 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 761913 Sample: Our order.exe Startdate: 06/12/2022 Architecture: WINDOWS Score: 100 41 Malicious sample detected (through community Yara rule) 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 Yara detected AgentTesla 2->45 47 7 other signatures 2->47 6 Our order.exe 3 2->6         started        9 WdFVsOe.exe 2 2->9         started        11 WdFVsOe.exe 3 2->11         started        process3 file4 23 C:\Users\user\AppData\...\Our order.exe.log, ASCII 6->23 dropped 14 Our order.exe 2 6 6->14         started        19 WdFVsOe.exe 3 9->19         started        49 Multi AV Scanner detection for dropped file 11->49 51 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->51 53 Machine Learning detection for dropped file 11->53 55 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 11->55 21 WdFVsOe.exe 2 11->21         started        signatures5 process6 dnsIp7 29 host39.registrar-servers.com 68.65.122.214, 49689, 49722, 587 NAMECHEAP-NETUS United States 14->29 25 C:\Users\user\AppData\Roaming\...\WdFVsOe.exe, PE32 14->25 dropped 27 C:\Users\user\...\WdFVsOe.exe:Zone.Identifier, ASCII 14->27 dropped 31 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->31 33 Tries to steal Mail credentials (via file / registry access) 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 37 Tries to harvest and steal ftp login credentials 19->37 39 Tries to harvest and steal browser information (history, passwords, etc) 19->39 file8 signatures9
Threat name:
ByteCode-MSIL.Trojan.Taskun
Status:
Malicious
First seen:
2022-12-06 07:15:48 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
509567b7ff1fe8a4f690297f9767633dad8f48588d02f9429dbd32090774e6a0
MD5 hash:
b80935d19fad50a348f8148d38b8a2ee
SHA1 hash:
ff30e011d1bebd0d8cf3e32a6ecc66447c7a2c21
SH256 hash:
6573eaa5f8ba4a072571b7fcbf714658fb8b2488f33e7b8124c43a0996970623
MD5 hash:
d207b4e50418ad23123b6f2102d5f6b5
SHA1 hash:
bfb6ed5e69f7819cd23401f9c4e0517fc0bc9403
SH256 hash:
636c82e024234ad78f20e8e4fe6f31b099f2bfeb5d80e0bc3751678894bc55c2
MD5 hash:
a6237b931a948dde92bbf4a9c855a7c1
SHA1 hash:
79d34cd9cdca131650d13a133bc2eb03fd5ac766
Detections:
AgentTesla
SH256 hash:
0de8ec1c344aa472382f27667beffa1b2157b9096aa198e44af5cf5758a0ca6f
MD5 hash:
afdaab489745ac2c38920eef9e032ddc
SHA1 hash:
679a73cc53c4a737e14be9c27abba9d7409d2037
SH256 hash:
ce1784d9f1ffa4a40e48f4bf1c29c85e4b90ebda2317834dfaf19108ea447310
MD5 hash:
6d0c905661e3bf881bd9e78dd3f368eb
SHA1 hash:
426bffa0a325bee0829a881dde8db1540ee44734
SH256 hash:
a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee
MD5 hash:
d45152a4b8d2922dfa7dfda2c70cff1a
SHA1 hash:
9a562efcf54e0e912ead4610de76a065d732eeab
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe a36c5d34f9b0de2069fb875c2b681145352c03a81a387d610301d98143a7fbee

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments