MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bdcf891f483abf731c4d428bc1cc7a82dc9d4d5e585c0082ab5a3031a2297f73. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | bdcf891f483abf731c4d428bc1cc7a82dc9d4d5e585c0082ab5a3031a2297f73 |
|---|---|
| SHA3-384 hash: | f8d406bcdbba5befe796577d20712d9e0e8500b4037ba66357a20d564bf71069ec3af4fb228fd470b5bec0e3f1e1b358 |
| SHA1 hash: | 9182c963a28ddf153901a501778f3c5f36464b5f |
| MD5 hash: | 1f7dbc20e84335e58c68205aa2d7db8c |
| humanhash: | harry-july-steak-lemon |
| File name: | SecuriteInfo.com.W32.MSIL_Agent.FPI.gen.Eldorado.20244.18739 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 884'224 bytes |
| First seen: | 2023-12-27 09:16:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger) |
| ssdeep | 12288:wH1O4dnheXhEzw4F6iLTRHr8I9Nc1xkxla6oqCJSV+8E1F:KMDSs4FlRLLN0k+HqCJR1F |
| Threatray | 4'229 similar samples on MalwareBazaar |
| TLSH | T19815C1FD08BD12EB81ADF6958BD89B27B018987B31116D6794C343974306A9239F31FE |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4505/5/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
437
Origin country :
FRVendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
SecuriteInfo.com.W32.MSIL_Agent.FPI.gen.Eldorado.20244.18739
Verdict:
Malicious activity
Analysis date:
2023-12-27 09:18:30 UTC
Tags:
stealer agenttesla
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTesla
Result
Verdict:
Malware
Maliciousness:
Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Reading critical registry keys
Setting a keyboard event handler
Searching for the window
Creating a window
Сreating synchronization primitives
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-27 08:02:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
14 of 23 (60.87%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla_v4
agenttesla
Similar samples:
+ 4'219 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
cf4df1120b4646e5c298f62a80544e12b89b1dc6cd9cc97310b2f98982c42f90
MD5 hash:
a5dc3e8471c18518f708147bb4799488
SHA1 hash:
97c2014cbc49f24e35c314db8886e531a0d3e10a
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
bdcf891f483abf731c4d428bc1cc7a82dc9d4d5e585c0082ab5a3031a2297f73
f7e5bc980e9a7659ba8aedcb0e5ec208b13d807657ceaeb276db2f5ddeb0b2cf
4e531e34c8132457b497653d69f5efe16c95a651aa0a47e8ab8f56ad1f35b51d
052b4eda2c31d34095e1fc77adf582681b3659a77cfb5ed167af380d6f08d9db
f7cdedd0c2255acdeec852eac9d0f27167cc48eff1d92d34fe099f3c7f21ae9a
affaae9ae22127b74b0ff16f553a8de07baf4b4a72d4b179d5adf9775a65f4ff
135a046874c7621664f5259d83120e71c426fb40d54104a27a6fd25cb5d2f9c9
4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d
7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4
37b76e89fcb5bbc28f1984b6bdd58a16e034dc49357dbced7d2aa1a6a25daa17
cd5afb25fb90fab49b4623b7d2005004fabec7c32685c3ac056919e56aaed18c
089463f7438aada6e397465f3951fd3ac4b5cdae44e8e88e6bc7620005b2b418
32f09ba1f13e6344e1eee8a59c0111e01fa260fb003260e95e42d36c849894c9
f7e5bc980e9a7659ba8aedcb0e5ec208b13d807657ceaeb276db2f5ddeb0b2cf
4e531e34c8132457b497653d69f5efe16c95a651aa0a47e8ab8f56ad1f35b51d
052b4eda2c31d34095e1fc77adf582681b3659a77cfb5ed167af380d6f08d9db
f7cdedd0c2255acdeec852eac9d0f27167cc48eff1d92d34fe099f3c7f21ae9a
affaae9ae22127b74b0ff16f553a8de07baf4b4a72d4b179d5adf9775a65f4ff
135a046874c7621664f5259d83120e71c426fb40d54104a27a6fd25cb5d2f9c9
4000571c4d2e02e55de74268eb9477d61f9f506c567a3eeb55ab7b68b395959d
7f6c8b5906b46483358eac0fe419f28cab57e935d8cb0bb0abf4fb0d3e1714a4
37b76e89fcb5bbc28f1984b6bdd58a16e034dc49357dbced7d2aa1a6a25daa17
cd5afb25fb90fab49b4623b7d2005004fabec7c32685c3ac056919e56aaed18c
089463f7438aada6e397465f3951fd3ac4b5cdae44e8e88e6bc7620005b2b418
32f09ba1f13e6344e1eee8a59c0111e01fa260fb003260e95e42d36c849894c9
SH256 hash:
21afe82a0b71ee589c26f32dc88e0a6e22817f21194b2a83f1807c6cecc8c818
MD5 hash:
440bb4db146ccb1161ac2bcf365d7676
SHA1 hash:
506eda511b46df6e95d86861e70fda81307f8623
SH256 hash:
bc1719d2ac9fd37f7300d9cfc6d20cf8d97f30c1647840c9592734ffcba5ad45
MD5 hash:
3a0450f65a4d3f482599ee64a4cc2113
SHA1 hash:
227c1576b139798bcaa05efe6ef8ca29748e2320
SH256 hash:
e3d65bd9581460ee982d8040e2376222317843cba4c45e1e8567a4bb2d426f66
MD5 hash:
0a64362f023ad6fb6846acba666136ef
SHA1 hash:
1cf8a0db76830c2a093084e2b04f268648a943de
SH256 hash:
bdcf891f483abf731c4d428bc1cc7a82dc9d4d5e585c0082ab5a3031a2297f73
MD5 hash:
1f7dbc20e84335e58c68205aa2d7db8c
SHA1 hash:
9182c963a28ddf153901a501778f3c5f36464b5f
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.