MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc3ac3b8a31b50aa2f02bb5feeb470e40f345880e27f56aa4c18cb6429490bd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 4 File information Comments

SHA256 hash: bc3ac3b8a31b50aa2f02bb5feeb470e40f345880e27f56aa4c18cb6429490bd9
SHA3-384 hash: 1c2592a57d4394d070c3208bee97362b435347fc90aa4c8c892d0cddf8f07d8f164ef573ca5a6040e1155b3e664662a8
SHA1 hash: 8be602bac5a6066caa9a20d8201639ce43c05d5a
MD5 hash: 4955fe974f339378e0b397a0aab40a2a
humanhash: salami-april-mango-floor
File name:4955fe974f339378e0b397a0aab40a2a
Download: download sample
Signature AgentTesla
File size:484'864 bytes
First seen:2021-06-24 00:46:19 UTC
Last seen:2021-06-24 03:44:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'643 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 6144:gLJv+oh+IWIHNGmcZbtCPtHU+jodNUAY4oo056edaURwc8U1W5oaba4Kyf1Jo/0l:gLJWogIJtubEPtHDj0tY4Z0QpPAyfwW
Threatray 127 similar samples on MalwareBazaar
TLSH 40A45C2E1AF5AF7DF54A92B710C64D201EA0ED6179CAE90FB7BE1D611F20518FE03942
Reporter zbetcheckin
Tags:32 AgentTesla exe

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://robyngraphs.com.au/WP/api.php https://threatfox.abuse.ch/ioc/153075/

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4955fe974f339378e0b397a0aab40a2a
Verdict:
Suspicious activity
Analysis date:
2021-06-24 00:48:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Agent Tesla AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Detected Agent Tesla keylogger
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-06-22 23:50:06 UTC
AV detection:
22 of 46 (47.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
eadcdb8fa91951f497b7243e636304e3dcaef0e1402bec43736b04ae710062b4
MD5 hash:
5c0385934d95e34fd13457ed88f7819c
SHA1 hash:
def55241af863f8cd0e2fb212b9becf5af5a50ca
SH256 hash:
95da782eab6f5500c98aa9039d15dd877582e2157d4677c1720d1462df5632cb
MD5 hash:
c1f797300e223351f6b71f1a3365b073
SHA1 hash:
c8bbdabff93258934c17e16b16621fd60b126a8e
SH256 hash:
ed8ad51e5452b44e092658e027f37f9962c323cca8b97da7e9c5c9b0bc4c273e
MD5 hash:
dc6bcdbcab7911f4c5e33b333cc5350f
SHA1 hash:
a735e54f612a556cae1fed932be81c97a402bcc6
SH256 hash:
d55800a825792f55999abdad199dfa54f3184417215a298910f2c12cd9cc31ee
MD5 hash:
bfb160a89f4a607a60464631ed3ed9fd
SHA1 hash:
1c981ef3eea8548a30e8d7bf8d0d61f9224288dd
SH256 hash:
bc3ac3b8a31b50aa2f02bb5feeb470e40f345880e27f56aa4c18cb6429490bd9
MD5 hash:
4955fe974f339378e0b397a0aab40a2a
SHA1 hash:
8be602bac5a6066caa9a20d8201639ce43c05d5a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

Executable exe bc3ac3b8a31b50aa2f02bb5feeb470e40f345880e27f56aa4c18cb6429490bd9

(this sample)

  
Delivery method
Distributed via web download

Comments