MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ac3e120197091d544f8e462bc2338c88545d511e6d29a680b17b9cbf3469ecff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 14
| SHA256 hash: | ac3e120197091d544f8e462bc2338c88545d511e6d29a680b17b9cbf3469ecff |
|---|---|
| SHA3-384 hash: | eed5699ea961b66dd8b1bf465fa02b4548bf7cfeb3d8a7e87d1c51ff4ecb47e6c4985507516d3357e48ccf881eb61990 |
| SHA1 hash: | 650083819750117b2732c7725933a20224c7e834 |
| MD5 hash: | d8f94b061c2a9373f8568d1f5fc09520 |
| humanhash: | green-happy-ceiling-oregon |
| File name: | dhl awb.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 273'475 bytes |
| First seen: | 2022-04-11 07:22:55 UTC |
| Last seen: | 2022-04-11 08:07:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 6144:HNeZmxKJXHtc1YBDhg16EpDu3uwYg4BYiWk1Ul0gEB2V:HNl0J9caBC1Du3uwgKl0gpV |
| TLSH | T10044120436B980BBF97717724C7943178E96EA2822A4470B67203F587D717E3D60EB7A |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla DHL exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
239
Origin country :
n/a
Vendor Threat Intelligence
Detection:
AgentTeslaV3
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Detection:
agenttesla
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-04-11 07:23:07 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
634d417309429ce5c6a447e15571db7435f58a750ca1d29d29b2abbbf03c4e54
MD5 hash:
7576ceaac2bb65f39a3cb71f429976da
SHA1 hash:
fa80ffd5aaf7992a58b403051d04bdab2800de70
Parent samples :
c0d5fa5acc4fb14f165188e7878072f63dc43b6b1c67923a8f608f0f8010cb7b
36143d6674053884d6bf2ce1e5bc8dd6f31b9d6b4d2fae272e37ac5649d00520
32e235425a71459bee33dffde1c4cb63c4ba379802d618c97f950e94ec2231c0
4f9e94485016489fef39c5c41d6b8d353c252dad2c118e37a4330acac5af0738
634d417309429ce5c6a447e15571db7435f58a750ca1d29d29b2abbbf03c4e54
0063c0564296cf678772016cfe969ae167ff29e1eeaa78702789beffb336e960
ec68676ceaa04b52327909ef20b1c9df65f33f59a2aa76d7052cb857b88ae905
b45450a263a277473db3f03e8257fb36594be9bd085a8a045f9f4fc48267eabd
3a7eef995236c7e9b182cb440127021ea5b5e105f54a900c11b7c1bb47512f41
ab1b148fbfb5711529360d1dc07d2e278d970d489acb4e6150928e23a635223b
9fcdec279fe98bedf09249f1f0fbf62c85915ef403b8ead5364a7919719fbc72
48aa870a455ed8431e93dd82a18b1ce240835b07e4c276ccd53ab938392dcc0f
4708bada9bbf77daade9a3f124eb0f5309ea68bba94c5bb4b332701d1d010185
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
3541875e5b62e84130450e229c73132431f93277343cf5214b65846d6000a7b9
872f77272de453f6fa432568b70c861d40911344ded71477faa8895bfdf36fdc
36143d6674053884d6bf2ce1e5bc8dd6f31b9d6b4d2fae272e37ac5649d00520
32e235425a71459bee33dffde1c4cb63c4ba379802d618c97f950e94ec2231c0
4f9e94485016489fef39c5c41d6b8d353c252dad2c118e37a4330acac5af0738
634d417309429ce5c6a447e15571db7435f58a750ca1d29d29b2abbbf03c4e54
0063c0564296cf678772016cfe969ae167ff29e1eeaa78702789beffb336e960
ec68676ceaa04b52327909ef20b1c9df65f33f59a2aa76d7052cb857b88ae905
b45450a263a277473db3f03e8257fb36594be9bd085a8a045f9f4fc48267eabd
3a7eef995236c7e9b182cb440127021ea5b5e105f54a900c11b7c1bb47512f41
ab1b148fbfb5711529360d1dc07d2e278d970d489acb4e6150928e23a635223b
9fcdec279fe98bedf09249f1f0fbf62c85915ef403b8ead5364a7919719fbc72
48aa870a455ed8431e93dd82a18b1ce240835b07e4c276ccd53ab938392dcc0f
4708bada9bbf77daade9a3f124eb0f5309ea68bba94c5bb4b332701d1d010185
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
3541875e5b62e84130450e229c73132431f93277343cf5214b65846d6000a7b9
872f77272de453f6fa432568b70c861d40911344ded71477faa8895bfdf36fdc
SH256 hash:
cd220ecdcab89a384a0f93b618779207a1f22b46ecf86191d4ac164f84557ff0
MD5 hash:
020140483dce3bc0d41e3e20a764bf8b
SHA1 hash:
8b8c8568271a5f6d91d8bd2853fb06e283b5aee4
SH256 hash:
82e88fadca30b00f59557e9f508b66c0022cd2a63764d55456b3d25281e34c57
MD5 hash:
79344335c9b97c90b4cf795e7c97a432
SHA1 hash:
ab67b3297134de4309a9b3d32d3e6848e4158257
SH256 hash:
fc93f772193eaf2d88a9224b4d4bcadf2d7d767ed727da26955f7afa350c74de
MD5 hash:
d18f13b4e9b63f05a67fc2376f947ed9
SHA1 hash:
5c6c067d69a866c07fe1a366fce8d2e9af846b21
SH256 hash:
ac3e120197091d544f8e462bc2338c88545d511e6d29a680b17b9cbf3469ecff
MD5 hash:
d8f94b061c2a9373f8568d1f5fc09520
SHA1 hash:
650083819750117b2732c7725933a20224c7e834
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.