MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf073967491dc400543fc944218b03eb85c982c6daf7a5852b9b68d6d25510a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: cf073967491dc400543fc944218b03eb85c982c6daf7a5852b9b68d6d25510a0
SHA3-384 hash: 31f89c6f4bb54b243df670073e541b13ecb607e6fe6cfd0ba6ee46d48b906b4730d19193e42ce8918116b68f859bbab0
SHA1 hash: d1c0de05b3a4c9443723ec5455a4a5644740a46e
MD5 hash: aa024a17f7f6f2d8862e2376f52aed09
humanhash: apart-one-angel-echo
File name:comprobante.pdf__________________________________________________.exe
Download: download sample
Signature AgentTesla
File size:33'554'432 bytes
First seen:2021-10-04 16:21:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger)
ssdeep 6144:F8LxBsMcCEF8e3sEVtvW3iG2ub7B/4P2YdS+N0ndTj0bh1:/MlE3sN3iTc7NgdzNKTja
Threatray 10'733 similar samples on MalwareBazaar
TLSH T16D77232B1AD2C4F6CC924AB11DBB7BB4F3B7880C9213260753719F6149B74B1A91E753
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter malwarelabnet
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
701
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Unauthorized injection to a recently created process
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Double Extension
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2021-10-04 15:29:09 UTC
AV detection:
23 of 45 (51.11%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Malware family:
Agent Tesla v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments