MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c16cd26f902e703b321ee0d6acf1726e52318f2de78db59d169389256114656b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: c16cd26f902e703b321ee0d6acf1726e52318f2de78db59d169389256114656b
SHA3-384 hash: 46296682f024f6ae0207c279c629f38711ee76a806d792302c5ba4a6573bff9026464dfdf22612e0b2a122c56a93c385
SHA1 hash: 29d48155dbe20ab33ffb80f047d8e74e63494d5d
MD5 hash: f8b5ef015483020d063198bad0205ec7
humanhash: uncle-hawaii-march-gee
File name:SecuriteInfo.com.Win32.PWSX-gen.15348.28328
Download: download sample
Signature AgentTesla
File size:898'560 bytes
First seen:2024-01-24 05:25:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:S8S8zAP6PSKz2xrbNYUmyw2O1s3+Q9AhD9Z08VHBDnlgiK6wSdvwqvDdi0C0eEGI:8846P5KBYL2OW3+20pln3jvT00
Threatray 5'284 similar samples on MalwareBazaar
TLSH T1D615AD9D365076EFC85BC932C9A82D64EA6065B7530BD303A45326ECDE0D69BCF250F2
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 58b4626ab6d880a8 (6 x AgentTesla, 1 x Formbook)
Reporter SecuriteInfoCom
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
330
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Reading critical registry keys
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-01-24 05:26:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
5b5b9edb7f69d1f6b8cbb34ac2d29f27250fdcbd47a93611dbb1916b1b7621d9
MD5 hash:
1266ab2aa73219efdf4789dcf5224872
SHA1 hash:
dfc764d59cd858af5a9cd03b7392de52eb577b44
Detections:
AgentTesla INDICATOR_EXE_Packed_GEN01
SH256 hash:
34f5917e05f0819f7e49449783aa020941291de231dd5103d7e23674ca46685b
MD5 hash:
d69e04c78ea77d3ac32763e57f492311
SHA1 hash:
df0f88bb1c07de814ed5f497457d63af64308249
SH256 hash:
c85bc328773aba91c794d88be8ac5ccd57dddbea157f6c128bb5a3b193e0319f
MD5 hash:
8b926a9877401238b870a1a2745b39a2
SHA1 hash:
50ab6730fee83524fe4e03f077229a32eeb07691
SH256 hash:
2b4cf8b51c4caac8a17c239ce12f5722630e9358060986625b0eed5dd9e01017
MD5 hash:
81c9b6f9ce6e6cc93bf89a1218f12e86
SHA1 hash:
1e2b99b28fc38272b81bc336a66c2960259668b6
SH256 hash:
c16cd26f902e703b321ee0d6acf1726e52318f2de78db59d169389256114656b
MD5 hash:
f8b5ef015483020d063198bad0205ec7
SHA1 hash:
29d48155dbe20ab33ffb80f047d8e74e63494d5d
Malware family:
AgentTesla.v4
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV4
Author:kevoreilly
Description:AgentTesla Payload
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments