MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a97278750b1c8339b6fc7601434b733174ec05d6bd5dbde44a2a98ca6951f183. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: a97278750b1c8339b6fc7601434b733174ec05d6bd5dbde44a2a98ca6951f183
SHA3-384 hash: c20a56b9dea62d5303e43aca2535ee09f9d9f63cf190b4eedb8ef0d6c06e40f71f3d0a033db9f3d0133b7852570a79bd
SHA1 hash: b84102eb344cbbefc25fd30f243945a1b538c696
MD5 hash: 7a01b7413325d444692f57f15292bced
humanhash: lithium-lemon-west-leopard
File name:PDA_pdf.scr
Download: download sample
Signature AgentTesla
File size:1'169'925 bytes
First seen:2021-09-06 05:13:40 UTC
Last seen:2021-09-09 10:03:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:qAOcZuXPoismzMCq3XeV8xC3syz0IwTq3XFQYcqa6lCKjDwo5:Q998b1TWX6Kteo5
Threatray 10'469 similar samples on MalwareBazaar
TLSH T131451201F6C674B2F17179F11A256688297D3D106D24CB3EA3B134AD8A35383DDA1BBE
dhash icon 37712b134b091529 (2 x AgentTesla, 1 x AveMariaRAT, 1 x MassLogger)
Reporter fabjer
Tags:AgentTesla exe scr

Intelligence


File Origin
# of uploads :
4
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PDA_pdf.scr
Verdict:
Suspicious activity
Analysis date:
2021-09-06 05:15:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Sending a UDP request
Launching a process
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Drops PE files with a suspicious file extension
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM autoit script
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-06 03:39:03 UTC
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
62bbd3457129c038425f73aea95495c6db139437412c1a0308b7224efe83fd3a
MD5 hash:
27dab92b44715a4a33c7c5f10860dcf7
SHA1 hash:
18bd884ea85a4201a19b4b6978a59ca04316b61c
SH256 hash:
a97278750b1c8339b6fc7601434b733174ec05d6bd5dbde44a2a98ca6951f183
MD5 hash:
7a01b7413325d444692f57f15292bced
SHA1 hash:
b84102eb344cbbefc25fd30f243945a1b538c696
Malware family:
Agent Tesla v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe a97278750b1c8339b6fc7601434b733174ec05d6bd5dbde44a2a98ca6951f183

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments