MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cbff950d72abf284d56f5baa005503d01c641efed79babea4e112481fae6cb53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: cbff950d72abf284d56f5baa005503d01c641efed79babea4e112481fae6cb53
SHA3-384 hash: bb631d4450edf3e60bd2a6a510b5babcdb4f2b94007b5877274a775e994439fa45dc94c87a08416cc8cffcbb8a06fb88
SHA1 hash: cb5f3b98c7dece7afe62a64b50772183f53659c7
MD5 hash: 56e751dfd3b62d05623ead551a40891d
humanhash: alaska-sodium-muppet-low
File name:DHL Express Shipping Doc..exe
Download: download sample
Signature AgentTesla
File size:905'216 bytes
First seen:2023-01-20 07:04:30 UTC
Last seen:2023-01-20 08:28:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:6UB/08uhY6cRvToOchjUc1756ml2mti3HXnJV4ilzP1:vK85poOcZUc1L4XXz4OP1
Threatray 24'183 similar samples on MalwareBazaar
TLSH T1AF157C516091C2D5ECB64E780378F92427859E6BA32D41AE7ED7343A88F378F84743A3
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
180
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DHL Express Shipping Doc..exe
Verdict:
Malicious activity
Analysis date:
2023-01-20 07:07:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Creating a file
Using the Windows Management Instrumentation requests
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 788058 Sample: DHL Express Shipping Doc..exe Startdate: 20/01/2023 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 9 other signatures 2->49 6 Skype.exe 3 2->6         started        9 DHL Express Shipping Doc..exe 3 2->9         started        12 Skype.exe 2 2->12         started        process3 file4 51 Multi AV Scanner detection for dropped file 6->51 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->53 55 May check the online IP address of the machine 6->55 59 2 other signatures 6->59 14 Skype.exe 14 7 6->14         started        31 C:\...\DHL Express Shipping Doc..exe.log, ASCII 9->31 dropped 57 Injects a PE file into a foreign processes 9->57 18 DHL Express Shipping Doc..exe 17 10 9->18         started        21 DHL Express Shipping Doc..exe 9->21         started        23 Skype.exe 7 12->23         started        25 Skype.exe 12->25         started        signatures5 process6 dnsIp7 33 api.ipify.org 14->33 35 api4.ipify.org 64.185.227.155, 443, 49695, 49698 WEBNXUS United States 18->35 37 api.telegram.org 149.154.167.220, 443, 49696, 49697 TELEGRAMRU United Kingdom 18->37 41 2 other IPs or domains 18->41 27 C:\Users\user\AppData\Roaming\...\Skype.exe, PE32 18->27 dropped 29 C:\Users\user\...\Skype.exe:Zone.Identifier, ASCII 18->29 dropped 61 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->61 63 Tries to steal Mail credentials (via file / registry access) 18->63 65 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->65 39 api.ipify.org 23->39 67 Tries to harvest and steal browser information (history, passwords, etc) 23->67 69 Installs a global keyboard hook 23->69 file8 signatures9
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-20 06:09:58 UTC
File Type:
PE (.Net Exe)
Extracted files:
23
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection persistence spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
9f75bfb67da98cefeb325bf89be2ebf0b235dabbe8617d9e23e117e03e4cf07e
MD5 hash:
babf1779f37d62b3f1b56622cd680ec2
SHA1 hash:
f340b46cf13975e4a083a621336d3ccf630e66f2
SH256 hash:
c45e5af468243b3c243802b6904a312520694fda3757e1715e06b31500da8f81
MD5 hash:
5d93fe58a55f1bb545213ddd0c4d2c67
SHA1 hash:
c794967f9f1def0cf83b44a516ca9cc57d6c49e3
SH256 hash:
3dfefeadd1852632d3ff4fc2247c4a0013f7e7ed6a96830daa6608507a8b481d
MD5 hash:
ed6e5b976b9348bcf45ad993f04b53bf
SHA1 hash:
6a1d624860b8e6bbf7f237ed49488e81d8f3f1fd
SH256 hash:
97e3138102f0a214b7d16352a27ea6cd11326a6eee9f0b81005f8b363573fd03
MD5 hash:
0bbea1b87e8aee751b3faa16bd505916
SHA1 hash:
5676b14e4b269f1d008ef1d814946d67f4ca1823
SH256 hash:
ab2f8dbc2b147528cecac6ea1a8886951c424be0b2026743b39d97f0cbabb04c
MD5 hash:
77ab42f4bbbf4565846eb8953192d71f
SHA1 hash:
3c662c756cc31867c0473716a74e777a65ced550
SH256 hash:
cbff950d72abf284d56f5baa005503d01c641efed79babea4e112481fae6cb53
MD5 hash:
56e751dfd3b62d05623ead551a40891d
SHA1 hash:
cb5f3b98c7dece7afe62a64b50772183f53659c7
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe cbff950d72abf284d56f5baa005503d01c641efed79babea4e112481fae6cb53

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments