MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c41893463c861e8d6274f2d5f5335ba4d23dfe4c6d6d65d8bc08eec140b4890d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | c41893463c861e8d6274f2d5f5335ba4d23dfe4c6d6d65d8bc08eec140b4890d |
|---|---|
| SHA3-384 hash: | d3ca3fe4e33375ac7cf6d564db154d19b25ceea4196249745124c9bcf59f8ec1c1214d731ae8e2999cf7f6a03f5b8057 |
| SHA1 hash: | 8b015776a4e0e1ba8495f89296b4eb5293faba33 |
| MD5 hash: | 6f605fd10c79ec475befda0cd232f38b |
| humanhash: | cardinal-arizona-timing-venus |
| File name: | Invoice Request.scr.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 717'824 bytes |
| First seen: | 2024-09-10 13:55:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:ksK8s/+/yHUvONddAckNe5xAkO5IGGswKPS3JFn0C53tqksN7t0lTO3tz0:RiMywONddAdN2ek975n3a97mO9 |
| Threatray | 681 similar samples on MalwareBazaar |
| TLSH | T13BE40117FAD98A11E8B901F7A47178CC12B17848D997E3B92EFC7D89CC722D1EE54602 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | d1d0e8e8e4f4ecd4 (30 x AgentTesla, 18 x RedLineStealer, 16 x SnakeKeylogger) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
460
Origin country :
USVendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Invoice Request.scr.exe
Verdict:
Malicious activity
Analysis date:
2024-09-10 13:57:38 UTC
Tags:
stealer evasion smtp exfiltration agenttesla
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
Kryptik
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-09-10 03:06:38 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla_v4
agenttesla
Similar samples:
+ 671 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla credential_access discovery execution keylogger persistence spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Credentials from Password Stores: Credentials from Web Browsers
AgentTesla
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
9f365a320405be969719491d46191fefa4e6a731684ed9fb6bcaa72bc6c1126e
MD5 hash:
63e615e39e78c95da103a5917a1be5e1
SHA1 hash:
e254316bc7025b7ce4e7f87148940588eab3d0a9
Detections:
AgentTesla
win_agent_tesla_g2
INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Agenttesla_type2
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
INDICATOR_EXE_Packed_GEN01
INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :
19a8acd3ad747a875b5823a461251d9daffd73044e56ebbc022b733ba1cc7a6e
ac7b1c336e0f115edc786056fe91c4ec33a22b8eb02c47fc51f07203f6138012
72bfb041b92ee316fdcc89683c945db30ecbc1c6ea51fda2cfe5d7dd17d4b188
b5ed2d924f6497474cedbed05cafbfe26a6ea62b0465db3cd62d450067aab388
90bcd90d58d9f3fd0b0d7c6771a1a701746b2f031c9498bd2b6a2a729f4dda02
2cbcfbd1e6f6eadb2443afec2d5c07c258d2b30cacb5c493796221cd91319fed
0cdd89801edc2304d208f9dca70cbe0248f5cf55876c827a275a57560fa396fe
60984a2e8b3c0a183ee80e1acdc4c50db06a95dcd626aa76fad49988a7e6ffeb
d7d85feb390da925a7f895859050d29e429c812f05f6b5d11546b0b372524fda
eb70ed06d47c8c56d64970223e42898350e262cd50c8f9d9b04a60004ae742ee
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3
5cb06070e2428b600080a8b4a21fde3ed5d773ca0a1cf3bea381ce96c1fa305d
4df8137744b852e25c6864097f8fa0aaceb424abfd5ea5e74d876ba3347e7508
66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6
5c875f9d28eae5afce4aac472b0825edef8cac3119d2991d3dd08a1fd32bd424
c41893463c861e8d6274f2d5f5335ba4d23dfe4c6d6d65d8bc08eec140b4890d
8eadfc2a0f3dce9b786340417545bc64a10dbd32e8677bbcf61929df787d4055
ac7b1c336e0f115edc786056fe91c4ec33a22b8eb02c47fc51f07203f6138012
72bfb041b92ee316fdcc89683c945db30ecbc1c6ea51fda2cfe5d7dd17d4b188
b5ed2d924f6497474cedbed05cafbfe26a6ea62b0465db3cd62d450067aab388
90bcd90d58d9f3fd0b0d7c6771a1a701746b2f031c9498bd2b6a2a729f4dda02
2cbcfbd1e6f6eadb2443afec2d5c07c258d2b30cacb5c493796221cd91319fed
0cdd89801edc2304d208f9dca70cbe0248f5cf55876c827a275a57560fa396fe
60984a2e8b3c0a183ee80e1acdc4c50db06a95dcd626aa76fad49988a7e6ffeb
d7d85feb390da925a7f895859050d29e429c812f05f6b5d11546b0b372524fda
eb70ed06d47c8c56d64970223e42898350e262cd50c8f9d9b04a60004ae742ee
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3
5cb06070e2428b600080a8b4a21fde3ed5d773ca0a1cf3bea381ce96c1fa305d
4df8137744b852e25c6864097f8fa0aaceb424abfd5ea5e74d876ba3347e7508
66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6
5c875f9d28eae5afce4aac472b0825edef8cac3119d2991d3dd08a1fd32bd424
c41893463c861e8d6274f2d5f5335ba4d23dfe4c6d6d65d8bc08eec140b4890d
8eadfc2a0f3dce9b786340417545bc64a10dbd32e8677bbcf61929df787d4055
SH256 hash:
33343c0adb3405cad6816634cc8e201eb78cd4e21660502be2c20216f7ef261d
MD5 hash:
2cbbb9d7b31bc3a3d14ddbac239732da
SHA1 hash:
b52d4affbc48e28f8155118c253b67ff04ed85c4
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
2a902033944acad8b24329beabb41c9058fe13956914c89464fea72e2075b059
MD5 hash:
cce505722f1b7264638940951dee6934
SHA1 hash:
91bfdf4208b13799bef92cef5f4a1a4c1f1dc3e6
SH256 hash:
c59a72e874640d2d2c5669edc14fdeb82a72cbacde61679907d2926b8ed79d08
MD5 hash:
b37fc99b846edbde0d0f36bee1760849
SHA1 hash:
0016396b048dcbda5b87742c32678f706db6362c
SH256 hash:
c41893463c861e8d6274f2d5f5335ba4d23dfe4c6d6d65d8bc08eec140b4890d
MD5 hash:
6f605fd10c79ec475befda0cd232f38b
SHA1 hash:
8b015776a4e0e1ba8495f89296b4eb5293faba33
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.