MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be10a38e0b54ec2152d5b6094ebe296db7ad897445a7d5a4b1bd82789437dd65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 19


Intelligence 19 IOCs YARA 4 File information Comments

SHA256 hash: be10a38e0b54ec2152d5b6094ebe296db7ad897445a7d5a4b1bd82789437dd65
SHA3-384 hash: abfb1b03d07e3ad31e959a003a4ab8535391f0ba4798801d6456ae167bb5f3a7e63b39d23a624c9fabae9520f34aae1c
SHA1 hash: a4b823e7b3a399b7f85c3e7505cd01fd19ec77d1
MD5 hash: aa89622fb45110f0ac7ff54b391215c0
humanhash: bakerloo-mirror-lactose-victor
File name:Recibo de pago swift2.PDF.exe
Download: download sample
Signature AgentTesla
File size:602'624 bytes
First seen:2023-10-25 12:35:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'738 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:dwmIp0SzZglySr5jsJXPZW7KXHPe6k96CAi/ha:dwtp0cgNlA3iKXHPe1w
Threatray 1'197 similar samples on MalwareBazaar
TLSH T174D4129C738B9B74E3FF53B6D455729113BA551B1420E30A0C8B40EA0A77F42A64AF7A
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter malwarelabnet
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
336
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Recibo de pago swift2.PDF.exe
Verdict:
Malicious activity
Analysis date:
2023-10-25 12:43:14 UTC
Tags:
agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd lolbin masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2023-10-25 01:57:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
19 of 23 (82.61%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
e0188ca91a7950265de8fbb690d33835671928159d558269c6f3792d1e3fc135
MD5 hash:
76ebfb32ae4ea8f30aea92d78f6dd1ed
SHA1 hash:
fbc810414199c4f7c6c7a0c2b530fd027a5d1c97
SH256 hash:
85cb15c8faf9637dfa21fdf4934793c2fce7a9e1fab54091645069c97357e860
MD5 hash:
0b89d8fc23753531ba10e3367e73751e
SHA1 hash:
c421597d6a8543f5fdb33de1075c0d56bffa7cf4
SH256 hash:
577688f16566f594b48128b1b79004ed42d4482408558203ae195a14800489ab
MD5 hash:
2c0eeb618719010964793bc0521fce86
SHA1 hash:
10a2db7f98eca3cf8bab68e3617e62c228212745
SH256 hash:
10278cf5ab1c5f5546dfb1304bbda18ca675a0e8e1349dcb0ef31ed6194faf8c
MD5 hash:
38fac24186205e7e454668f493ee4be8
SHA1 hash:
0c0b6cf267e9ce8bee16231bd1de791cd19cbb0c
Detections:
AgentTeslaXorStringsNet
Parent samples :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 hash:
be10a38e0b54ec2152d5b6094ebe296db7ad897445a7d5a4b1bd82789437dd65
MD5 hash:
aa89622fb45110f0ac7ff54b391215c0
SHA1 hash:
a4b823e7b3a399b7f85c3e7505cd01fd19ec77d1
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments