MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c08d6151741d6906767aef938ccd845f610109a4fe775c2d52ece1bc9132e114. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: c08d6151741d6906767aef938ccd845f610109a4fe775c2d52ece1bc9132e114
SHA3-384 hash: 2501e799e7aaf0673f85d3437b0c1791e7fa03a4a39f36608381fe36ab1694d7f63e6e2c1d3887b44dbb08a1d3459c5a
SHA1 hash: cc5a01b1c61c77dfb16ef1da00b1385cafe22db5
MD5 hash: 076e7b0f5ba0e28b2132c8857522ec80
humanhash: lithium-vegan-double-quebec
File name:FFWMQQSH.EXE
Download: download sample
Signature AgentTesla
File size:982'016 bytes
First seen:2020-12-22 06:40:58 UTC
Last seen:2020-12-22 08:46:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:DUzwNc7PSyVwJRjl8mFSkVXeUeYrzo67w:DNtyVwRjOlkVXfPo6
Threatray 1'938 similar samples on MalwareBazaar
TLSH 1825AE303AEE6619F073BF755AD07596AAFFF6236303D41D28A1038B4613D81DEA153A
Reporter cocaman
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
290
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FFWMQQSH.EXE
Verdict:
Malicious activity
Analysis date:
2020-12-22 06:50:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Creating a process with a hidden window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code contains very large strings
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM_3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 333033 Sample: FFWMQQSH.EXE Startdate: 22/12/2020 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Sigma detected: Scheduled temp file as task from temp location 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 8 other signatures 2->39 7 FFWMQQSH.EXE 7 2->7         started        process3 file4 19 C:\Users\user\AppData\...\qSvlNboBmPNY.exe, PE32 7->19 dropped 21 C:\Users\...\qSvlNboBmPNY.exe:Zone.Identifier, ASCII 7->21 dropped 23 C:\Users\user\AppData\Local\...\tmp12C0.tmp, XML 7->23 dropped 25 C:\Users\user\AppData\...\FFWMQQSH.EXE.log, ASCII 7->25 dropped 41 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->43 45 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->45 47 2 other signatures 7->47 11 FFWMQQSH.EXE 4 7->11         started        15 schtasks.exe 1 7->15         started        signatures5 process6 dnsIp7 27 nusatek.com 103.6.198.43, 49765, 49775, 49776 EXABYTES-AS-APExaBytesNetworkSdnBhdMY Malaysia 11->27 29 mail.nusatek.com 11->29 31 192.168.2.1 unknown unknown 11->31 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->49 51 Tries to steal Mail credentials (via file access) 11->51 53 Tries to harvest and steal ftp login credentials 11->53 55 2 other signatures 11->55 17 conhost.exe 15->17         started        signatures8 process9
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-22 06:41:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
c08d6151741d6906767aef938ccd845f610109a4fe775c2d52ece1bc9132e114
MD5 hash:
076e7b0f5ba0e28b2132c8857522ec80
SHA1 hash:
cc5a01b1c61c77dfb16ef1da00b1385cafe22db5
SH256 hash:
45f2c01fd087e11298d26d1ce58c5b4a979a724db265419e1d4c44c2fb1b253c
MD5 hash:
d2457f94eccd4b7305404ff6bcfa4bcd
SHA1 hash:
c2bc7ca5d2fb82171c627f48d361c473befc87fe
SH256 hash:
9efc5f103388df32b63ac75027f13a6692da236ff72fca303bd5abbc3fa2f135
MD5 hash:
577ed4ff9d4ad91e889b15cbff9f98ed
SHA1 hash:
e169fa4729b3a533c4e165c57507917ea520b01a
SH256 hash:
012f44295b7ff18c41f19ca4650d0b21fa4080d4b4b9209aed06e2e84504b5cc
MD5 hash:
ddc928fd6ded17d4f0a22927bb0bf37a
SHA1 hash:
f289314ab7da208824644b370630508391b9098d
SH256 hash:
d1111b4b9dcf5d43eea9b3668e501a8b5959335342c878deb423cf62362169bd
MD5 hash:
3c4f1ac34b80b5b1fbd7b07e9578707b
SHA1 hash:
f9b26147e28d3ce7d81f180293c056030917f9c5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe c08d6151741d6906767aef938ccd845f610109a4fe775c2d52ece1bc9132e114

(this sample)

Comments