MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c5c5950509109e01461d9a3779f6ff994b755f4f995c241c1d0e9f775df867c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: c5c5950509109e01461d9a3779f6ff994b755f4f995c241c1d0e9f775df867c6
SHA3-384 hash: 80566fa432dbec062a3f5842188df328866964062f556f1717b7e16d217cfda5e3b01e9f17ec2b7e9cf29da49689fa4b
SHA1 hash: 791d987a38859f72c92785ac77b2c8f0496509ce
MD5 hash: da810b52ff6cc5c049404f4039147403
humanhash: black-carbon-stairway-zulu
File name:c5c5950509109e01461d9a3779f6ff994b755f4f995c241c1d0e9f775df867c6
Download: download sample
Signature AgentTesla
File size:713'728 bytes
First seen:2020-11-14 18:28:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2198dce435faa52a41b785f39a5a49fe (30 x AgentTesla, 24 x Loki, 9 x HawkEye)
ssdeep 12288:j1WMAAIWHOFXfQwdGkgw6DbigXgF9xOoPBtA9cdz0vtP:jRAEHOlrXgwClA9AovyazUP
Threatray 2'769 similar samples on MalwareBazaar
TLSH 02E49E2AF2D04837F167163C8D0B97A89835BD113D24F97A3BF51D3C9F39A8128652A7
Reporter seifreed
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Moving of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Moves itself to temp directory
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 316654 Sample: mQZgYDbf6K Startdate: 15/11/2020 Architecture: WINDOWS Score: 100 32 Found malware configuration 2->32 34 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 3 other signatures 2->38 6 mQZgYDbf6K.exe 2->6         started        9 YYtJku.exe 2->9         started        11 YYtJku.exe 2->11         started        process3 signatures4 40 Detected unpacking (changes PE section rights) 6->40 42 Detected unpacking (overwrites its own PE header) 6->42 44 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->44 46 Contains functionality to detect sleep reduction / modifications 6->46 13 mQZgYDbf6K.exe 17 5 6->13         started        48 Multi AV Scanner detection for dropped file 9->48 50 Machine Learning detection for dropped file 9->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->52 18 YYtJku.exe 2 9->18         started        54 Maps a DLL or memory area into another process 11->54 20 YYtJku.exe 2 11->20         started        process5 dnsIp6 26 smtp.yandex.ru 77.88.21.158, 49732, 587 YANDEXRU Russian Federation 13->26 28 elb097307-934924932.us-east-1.elb.amazonaws.com 23.21.126.66, 443, 49731 AMAZON-AESUS United States 13->28 30 3 other IPs or domains 13->30 22 C:\Users\user\AppData\Roaming\...\YYtJku.exe, PE32 13->22 dropped 24 C:\Users\user\...\YYtJku.exe:Zone.Identifier, ASCII 13->24 dropped 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->56 58 Moves itself to temp directory 13->58 60 Tries to steal Mail credentials (via file access) 13->60 62 3 other signatures 13->62 file7 signatures8
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-11-14 18:31:40 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
AgentTesla
Unpacked files
SH256 hash:
c5c5950509109e01461d9a3779f6ff994b755f4f995c241c1d0e9f775df867c6
MD5 hash:
da810b52ff6cc5c049404f4039147403
SHA1 hash:
791d987a38859f72c92785ac77b2c8f0496509ce
SH256 hash:
254b3bcdae8905cd27bdc612f9fc4b3ce4468c914f0af43f0bbe24d9564fd71c
MD5 hash:
04004c2be11668d894c2baea2ab83511
SHA1 hash:
b7806878335cb211a19c78fc3517436ddde0dd0b
SH256 hash:
bf8160d889d88a671ed4a8c5f78b89fe8fd16aa9898ffe589d1b2209e242fe8a
MD5 hash:
3d8db3fd126e4fff4e02ae6dd2764d05
SHA1 hash:
e1bd21997232fc9aa034d529e0e701f3227bfd37
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments