MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8ddb09a16d9a6989c8bdd783722c939082bc42b871b3cbfe1cfd8532176fe0c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: a8ddb09a16d9a6989c8bdd783722c939082bc42b871b3cbfe1cfd8532176fe0c
SHA3-384 hash: e56cdbf82482236dcc6f0f16ac88209e321e4fb77c9e3c0a5515088a3514c40a1ceeb2612a4513b67c6d519dffa6ed6a
SHA1 hash: 0791eeca822cd645cb7a56d511fe70f92863a120
MD5 hash: bfefe5a8dad630ebf2934ba7b79ed548
humanhash: pennsylvania-grey-stairway-ack
File name:SOA # 87594094.exe
Download: download sample
Signature AgentTesla
File size:1'327'616 bytes
First seen:2023-06-23 06:07:54 UTC
Last seen:2023-06-23 06:18:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:Z7MyuyF1dR7wJ1KNoQhDH/lmXHX0E9jcrZoc+Ox5zz9n6bjV6CDRbAns5/bxAfM2:Z7MyuyTTMJ1KNoefo30ecrZocBv96bjo
TLSH T13555F1503669AF60E47A8BF60860527157FA6E5BB03EF7094EC3B2DB25B1F118921F13
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter cocaman
Tags:AgentTesla api-telegram-org exe INVOICE Shipping

Intelligence


File Origin
# of uploads :
2
# of downloads :
247
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
SOA # 87594094.exe
Verdict:
Malicious activity
Analysis date:
2023-06-23 07:01:03 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, FormBook, Neshta
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected FormBook
Yara detected Neshta
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 893273 Sample: SOA_#_87594094.exe Startdate: 23/06/2023 Architecture: WINDOWS Score: 100 122 Snort IDS alert for network traffic 2->122 124 Found malware configuration 2->124 126 Malicious sample detected (through community Yara rule) 2->126 128 13 other signatures 2->128 13 SOA_#_87594094.exe 7 2->13         started        17 tmTdOtNafpA.exe 3 2->17         started        19 svchost.com 2->19         started        process3 file4 78 C:\Users\user\AppData\...\tmTdOtNafpA.exe, PE32 13->78 dropped 80 C:\Users\...\tmTdOtNafpA.exe:Zone.Identifier, ASCII 13->80 dropped 82 C:\Users\user\AppData\Local\...\tmp7D4F.tmp, XML 13->82 dropped 84 C:\Users\user\...\SOA_#_87594094.exe.log, ASCII 13->84 dropped 160 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 13->160 162 May check the online IP address of the machine 13->162 164 Uses schtasks.exe or at.exe to add and modify task schedules 13->164 170 2 other signatures 13->170 21 SOA_#_87594094.exe 17 12 13->21         started        26 powershell.exe 21 13->26         started        28 schtasks.exe 1 13->28         started        166 Multi AV Scanner detection for dropped file 17->166 168 Machine Learning detection for dropped file 17->168 30 UmajCN.exe 19->30         started        signatures5 process6 dnsIp7 90 api4.ipify.org 173.231.16.76, 443, 49699, 49702 WEBNXUS United States 21->90 92 api.telegram.org 149.154.167.220, 443, 49700, 49701 TELEGRAMRU United Kingdom 21->92 94 api.ipify.org 21->94 72 C:\Users\user\AppData\Roaming\...\UmajCN.exe, PE32 21->72 dropped 74 C:\Users\user\AppData\Roaming\...\bin.exe, PE32 21->74 dropped 76 C:\Users\user\...\UmajCN.exe:Zone.Identifier, ASCII 21->76 dropped 138 Tries to steal Mail credentials (via file / registry access) 21->138 140 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->140 142 Installs a global keyboard hook 21->142 32 bin.exe 21->32         started        37 conhost.exe 26->37         started        39 conhost.exe 28->39         started        file8 signatures9 process10 dnsIp11 88 192.168.2.1 unknown unknown 32->88 64 C:\Windows\svchost.com, PE32 32->64 dropped 66 C:\Users\user\AppData\Local\Temp\...\bin.exe, PE32 32->66 dropped 68 C:\ProgramData\...\vcredist_x86.exe, PE32 32->68 dropped 70 9 other malicious files 32->70 dropped 130 Antivirus detection for dropped file 32->130 132 Creates an undocumented autostart registry key 32->132 134 Machine Learning detection for dropped file 32->134 136 3 other signatures 32->136 41 bin.exe 32->41         started        file12 signatures13 process14 signatures15 152 Antivirus detection for dropped file 41->152 154 Multi AV Scanner detection for dropped file 41->154 156 Machine Learning detection for dropped file 41->156 158 3 other signatures 41->158 44 svchost.com 41->44         started        process16 dnsIp17 102 broadfield-party.com 63.250.43.130, 49703, 80 NAMECHEAP-NETUS United States 44->102 104 stemp21.com 5.9.208.227, 49710, 49711, 49712 HETZNER-ASDE Germany 44->104 106 3 other IPs or domains 44->106 86 C:\Users\user\Downloads\ChromeSetup.exe, PE32 44->86 dropped 172 Antivirus detection for dropped file 44->172 174 Multi AV Scanner detection for dropped file 44->174 176 Machine Learning detection for dropped file 44->176 49 UmajCN.exe 44->49         started        52 control.exe 44->52         started        file18 signatures19 process20 signatures21 108 Multi AV Scanner detection for dropped file 49->108 110 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 49->110 112 May check the online IP address of the machine 49->112 120 2 other signatures 49->120 54 UmajCN.exe 49->54         started        58 svchost.com 49->58         started        114 Tries to steal Mail credentials (via file / registry access) 52->114 116 Tries to harvest and steal browser information (history, passwords, etc) 52->116 118 Maps a DLL or memory area into another process 52->118 process22 dnsIp23 96 api4.ipify.org 54->96 98 api.telegram.org 54->98 100 api.ipify.org 54->100 144 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 54->144 146 Tries to steal Mail credentials (via file / registry access) 54->146 148 Tries to harvest and steal browser information (history, passwords, etc) 54->148 150 Installs a global keyboard hook 54->150 60 schtasks.exe 58->60         started        signatures24 process25 process26 62 conhost.exe 60->62         started       
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2023-06-22 10:14:35 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
23 of 36 (63.89%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
agenttesla
Result
Malware family:
Score:
  10/10
Tags:
family:agenttesla family:neshta collection keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Detect Neshta payload
Neshta
Malware Config
C2 Extraction:
https://api.telegram.org/bot5822767759:AAGyoB0TuTu-nxePIhAc9iFqDwaUcPD4oHA/
Unpacked files
SH256 hash:
52f358d201e81d3a0391cedd3042e2f957555b77aa49559f7fb810bbb7673ba1
MD5 hash:
c785ddc46141af772c75101d17c46a41
SHA1 hash:
e248723b6f60cc7607980d07172b64c33b2b2f15
SH256 hash:
0160739cfd8d1897931f6821d701e3089c2bbd03d3ff8ed977ca4c618876b7e4
MD5 hash:
42fa7553572a0e8d2056a7c77597f57a
SHA1 hash:
c1beb634d03f733eedf2f2b4fc3ab14a4b388ae6
SH256 hash:
50cadea79b757221812b85aa55ba7251c2fa1afd64471bbf2c3c92a55908d0d0
MD5 hash:
dc73107c53f00e88cbfee7af7cc83928
SHA1 hash:
5e067699365a5db792da1bb8cb6ca77b8dd83373
SH256 hash:
28ade32be5011dee51e25bd036fab98c0bdcd38bb8102dd2fdf6068576576d0a
MD5 hash:
a675dfca29abcd5dc6ee9b4a44a1b591
SHA1 hash:
59ed1e88e67f2a5fb3c40aa6d6bd82b98ef31dad
Detections:
AgentTeslaXorStringsNet
SH256 hash:
a8e9029a1761812b7c80c37264f113a7a2562923a4d0706d2604caea5d8b3ced
MD5 hash:
26a50acbec961a7580ff002fa4cbd150
SHA1 hash:
12a7a91a36550523280ae5b48d143de3221a1aef
SH256 hash:
a8ddb09a16d9a6989c8bdd783722c939082bc42b871b3cbfe1cfd8532176fe0c
MD5 hash:
bfefe5a8dad630ebf2934ba7b79ed548
SHA1 hash:
0791eeca822cd645cb7a56d511fe70f92863a120
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe a8ddb09a16d9a6989c8bdd783722c939082bc42b871b3cbfe1cfd8532176fe0c

(this sample)

Comments