MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d47da005885b968328d25d493a11e0fe3a146c9103f24b0de735a02b117c6a4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: d47da005885b968328d25d493a11e0fe3a146c9103f24b0de735a02b117c6a4b
SHA3-384 hash: e8b228eef8b5f67d1dd33f4b33df36b175275a52805b349a243b4e05a3322ff53e45b6b09a7d8e705e20b8b701f562ac
SHA1 hash: bfd640462cf230417dff52d54890481b40c4514d
MD5 hash: 280fdaa58e74bc19ea04478d66b66c57
humanhash: skylark-tennessee-indigo-beryllium
File name:280fdaa5_by_Libranalysis
Download: download sample
Signature AgentTesla
File size:70'144 bytes
First seen:2021-05-24 09:01:40 UTC
Last seen:2021-05-25 06:14:13 UTC
File type:PowerPoint file ppt
MIME type:application/vnd.ms-powerpoint
ssdeep 384:sVYTEtFLvzoNee4eH7uwnmWYTdPiclFo39D:JEb7zPYuwnyT1icjo
TLSH C763C6107390C526E13A9A728ED7C7DE3734FC50AE61872B31E9331F2D7A6919E26784
Reporter Libranalysis
Tags:AgentTesla


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
2
# of downloads :
160
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
280fdaa5_by_Libranalysis
Verdict:
Malicious activity
Analysis date:
2021-05-24 09:13:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Launching a process by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
100 / 100
Signature
Command shell drops VBS files
Creates a scheduled task launching mshta.exe (likely to bypass HIPS)
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (has network functionality)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 422596 Sample: 280fdaa5_by_Libranalysis Startdate: 24/05/2021 Architecture: WINDOWS Score: 100 55 Multi AV Scanner detection for submitted file 2->55 57 Machine Learning detection for sample 2->57 59 Sigma detected: Microsoft Office Product Spawning Windows Shell 2->59 61 3 other signatures 2->61 9 cmd.exe 1 2->9         started        11 taskeng.exe 1 2->11         started        13 cmd.exe 2->13         started        15 2 other processes 2->15 process3 process4 17 POWERPNT.EXE 153 26 9->17         started        19 mshta.exe 11->19         started        21 powershell.exe 13->21         started        23 powershell.exe 15->23         started        process5 25 mshta.exe 6 47 17->25         started        dnsIp6 49 j.mp 67.199.248.17, 443, 49165 GOOGLE-PRIVATE-CLOUDUS United States 25->49 51 blogspot.l.googleusercontent.com 216.58.214.225, 443, 49166, 49169 GOOGLEUS United States 25->51 53 3 other IPs or domains 25->53 65 Very long command line found 25->65 67 Uses schtasks.exe or at.exe to add and modify task schedules 25->67 69 Creates a scheduled task launching mshta.exe (likely to bypass HIPS) 25->69 71 2 other signatures 25->71 29 cmd.exe 2 25->29         started        33 cmd.exe 25->33         started        35 schtasks.exe 25->35         started        signatures7 process8 file9 43 C:\Users\Public\SiggiaW.vbs, ASCII 29->43 dropped 73 Command shell drops VBS files 29->73 37 wscript.exe 10 29->37         started        75 Potential malicious VBS script found (has network functionality) 33->75 41 powershell.exe 6 33->41         started        signatures10 process11 dnsIp12 45 ia801408.us.archive.org 207.241.228.148, 443, 49181 INTERNET-ARCHIVEUS United States 37->45 47 archive.org 37->47 63 System process connects to network (likely due to code injection or exploit) 37->63 signatures13
Threat name:
Script-Macro.Downloader.EncDoc
Status:
Malicious
First seen:
2021-05-24 09:02:12 UTC
AV detection:
10 of 46 (21.74%)
Threat level:
  3/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger macro spyware stealer trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Blocklisted process makes network request
Drops file in Drivers directory
AgentTesla Payload
AgentTesla
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments