MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5338c385ea91e86fe18a5ce73e1ec9508f4e8ad2aa78b95228a91baebdedb1b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: a5338c385ea91e86fe18a5ce73e1ec9508f4e8ad2aa78b95228a91baebdedb1b
SHA3-384 hash: e748c320817db080eceba2047c2df104a4535683df117855c689932acb24345ea2cb8ef99c33967a83e9af7641fe506a
SHA1 hash: 8f1f83737931dd9f0a38da5b60ab47fd8daa38aa
MD5 hash: 5cedb373543d672c362044c043d253d1
humanhash: fourteen-iowa-colorado-lamp
File name:SecuriteInfo.com.W32.AIDetectNet.01.29003.16011
Download: download sample
Signature AgentTesla
File size:444'928 bytes
First seen:2022-07-27 04:46:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 6144:lAQqlDbNZfmr3PxeOuaQUVzlgseQLkx9SJ2g2ESELs/BUJWHf4DRRJsWHw0f3HqC:lwpbs3PxeOzTVzOaLk+JRmigfMMm7+
Threatray 18'317 similar samples on MalwareBazaar
TLSH T1B89401F679C3102DE30E32B10676AEA3F255E9B5011D90BCDFFE68594ED48B942A3B11
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9800626eece2e0e8 (3 x AgentTesla, 1 x a310Logger, 1 x BluStealer)
Reporter SecuriteInfoCom
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a file
Using the Windows Management Instrumentation requests
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Moving of the original file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates multiple autostart registry keys
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects files into Windows application
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Moves itself to temp directory
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 674058 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 27/07/2022 Architecture: WINDOWS Score: 100 62 Snort IDS alert for network traffic 2->62 64 Multi AV Scanner detection for domain / URL 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 8 other signatures 2->68 7 SecuriteInfo.com.W32.AIDetectNet.01.29003.exe 1 5 2->7         started        11 excel.exe 2 2->11         started        13 Uarexqz.exe 2 2->13         started        15 2 other processes 2->15 process3 file4 52 C:\Users\user\AppData\Roaming\...\Uarexqz.exe, PE32 7->52 dropped 54 C:\Users\user\...\Uarexqz.exe:Zone.Identifier, ASCII 7->54 dropped 56 SecuriteInfo.com.W...et.01.29003.exe.log, ASCII 7->56 dropped 82 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->82 84 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->84 86 Encrypted powershell cmdline option found 7->86 88 Creates multiple autostart registry keys 7->88 17 SecuriteInfo.com.W32.AIDetectNet.01.29003.exe 17 5 7->17         started        22 powershell.exe 15 7->22         started        90 Antivirus detection for dropped file 11->90 92 Multi AV Scanner detection for dropped file 11->92 94 Machine Learning detection for dropped file 11->94 96 Document exploit detected (process start blacklist hit) 11->96 24 excel.exe 11->24         started        26 powershell.exe 11->26         started        34 3 other processes 11->34 98 Injects a PE file into a foreign processes 13->98 28 powershell.exe 13->28         started        30 Uarexqz.exe 13->30         started        100 Injects files into Windows application 15->100 32 excel.exe 15->32         started        36 2 other processes 15->36 signatures5 process6 dnsIp7 58 208.67.106.111, 49756, 49769, 80 GRAYSON-COLLIN-COMMUNICATIONSUS United States 17->58 48 C:\Users\user\AppData\Local\...\excel.exe, PE32 17->48 dropped 50 C:\Users\user\...\excel.exe:Zone.Identifier, ASCII 17->50 dropped 70 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->70 72 Moves itself to temp directory 17->72 74 Tries to steal Mail credentials (via file / registry access) 17->74 80 4 other signatures 17->80 38 conhost.exe 22->38         started        76 Tries to harvest and steal browser information (history, passwords, etc) 24->76 78 Injects files into Windows application 24->78 60 192.168.2.1 unknown unknown 26->60 40 conhost.exe 26->40         started        42 conhost.exe 28->42         started        44 conhost.exe 36->44         started        46 conhost.exe 36->46         started        file8 signatures9 process10
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-07-27 00:40:51 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
23 of 40 (57.50%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Malware Config
C2 Extraction:
http://208.67.106.111/flip/inc/302fd3be3ee791.php
Unpacked files
SH256 hash:
b6aeaa254550b42bd08691a680ccd8740bfc320aa8aa6d38db8e5e25fcd32dd5
MD5 hash:
e8060cd5f576cbe8e1de5eff94437603
SHA1 hash:
cc320a966136fc6424445159a133e61ec9336d3c
SH256 hash:
a6acfe617040a5005be0d1675756dc9f09596d3bb2bb3ebc8a2c6881b8c4cfd7
MD5 hash:
db843358b89f4074346cab346720ab06
SHA1 hash:
94d77a5f2d66f20baf557ad30c3ab284665980d9
SH256 hash:
e3f7046ded286a9a8e66fbe786110d3d6e1f4b6d5a06b6a0ff9ee4333f60f26b
MD5 hash:
d0dbc1de4bdad515dac423913492ba6f
SHA1 hash:
3093178ad09c1676ed21fdc43b426aef420e41ee
SH256 hash:
a5338c385ea91e86fe18a5ce73e1ec9508f4e8ad2aa78b95228a91baebdedb1b
MD5 hash:
5cedb373543d672c362044c043d253d1
SHA1 hash:
8f1f83737931dd9f0a38da5b60ab47fd8daa38aa
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekSHen
Description:AgentTeslaV3 infostealer payload
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments