MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3
SHA3-384 hash: 9cf11e6030483727e4c78598d99ac90a9c91d200ff920a4971b9b38c4271db8ab6291d0742f3a1f7ed615e37674b05e9
SHA1 hash: 1911d514d8e9d3310b2876ee591553250a31f44f
MD5 hash: 05971e8521240cd588015e689baab4b7
humanhash: colorado-violet-vegan-grey
File name:Ningbo - Past Due Invoices.scr
Download: download sample
Signature AgentTesla
File size:673'280 bytes
First seen:2024-09-24 11:55:39 UTC
Last seen:2024-09-24 16:30:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:pOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:pWsJrm2DO0TvqH42ZLuMj7GEXze3UI
Threatray 1'353 similar samples on MalwareBazaar
TLSH T156E41224229AD912C4A24FB96872D2F84BB5AECD9913D30BDFDA7EFF78733054440652
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter cocaman
Tags:AgentTesla exe INVOICE payment scr

Intelligence


File Origin
# of uploads :
2
# of downloads :
415
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Ningbo - Past Due Invoices.7z.001
Verdict:
No threats detected
Analysis date:
2024-09-24 12:00:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Network Stealth Msil Agenttesla Micro Tori Msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Reading critical registry keys
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1516641 Sample: Ningbo - Past Due Invoices.... Startdate: 24/09/2024 Architecture: WINDOWS Score: 100 46 mail.iaa-airferight.com 2->46 48 api.ipify.org 2->48 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 13 other signatures 2->60 8 Ningbo - Past Due Invoices.scr.exe 7 2->8         started        12 jzARpPDhrks.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\jzARpPDhrks.exe, PE32 8->38 dropped 40 C:\Users\...\jzARpPDhrks.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp94CB.tmp, XML 8->42 dropped 44 C:\...44ingbo - Past Due Invoices.scr.exe.log, ASCII 8->44 dropped 62 Writes to foreign memory regions 8->62 64 Allocates memory in foreign processes 8->64 66 Adds a directory exclusion to Windows Defender 8->66 68 Injects a PE file into a foreign processes 8->68 14 RegSvcs.exe 15 2 8->14         started        18 powershell.exe 20 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        70 Antivirus detection for dropped file 12->70 72 Multi AV Scanner detection for dropped file 12->72 74 Machine Learning detection for dropped file 12->74 24 RegSvcs.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 50 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->50 52 api.ipify.org 104.26.12.205, 443, 49710, 49713 CLOUDFLARENETUS United States 14->52 76 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->76 78 Loading BitLocker PowerShell Module 18->78 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        80 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->80 82 Tries to steal Mail credentials (via file / registry access) 24->82 84 Tries to harvest and steal ftp login credentials 24->84 86 Tries to harvest and steal browser information (history, passwords, etc) 24->86 36 conhost.exe 26->36         started        signatures9 process10
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-09-24 03:12:20 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Command and Scripting Interpreter: PowerShell
AgentTesla
Verdict:
Malicious
Tags:
agent_tesla
YARA:
n/a
Unpacked files
SH256 hash:
5f54dacd422f4b063a925b312838642965bab92dd7235b8c9580a60ef46e5d14
MD5 hash:
8ffbd04efdcdafa0b86ef20fb37c29bb
SHA1 hash:
a7018a31bb74977711f2f4b56e29aa335448914f
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Parent samples :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 hash:
6049c7b6c4cfff9d571c8062dca6dbd9bd50fbc04e862df7ff2fe318c80f3826
MD5 hash:
df5b22cbebaf1bcaeef41747c5a9903f
SHA1 hash:
7e96488eb868a5a82610fe7599eacc8cfa90a59c
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
9f278aa2f85b03974a640446d0605c39c23cebc0efe78d4dbec3297ac1c2149b
MD5 hash:
856458b3cafb49e15d9d4b7e9763ffd4
SHA1 hash:
3def092eabc842862ca4194d9781fa589df418f7
Detections:
AgentTesla win_agent_tesla_g2 Agenttesla_type2
Parent samples :
6c18d7057ece3ae1524782a51f4dfa5589128b5a4c695cf1d3b9f1b95169cc4d
1736cd52fdc1deacedeac1de86d461ceb01c476e307520762b74b67ca8fa4b4b
cc7ca4eb1a90642066ef9697165ceb0a12cb5b8498a198cbed5524cab5974e74
7df1b33f35a3ca87f9242153c847cc0d8e1d45c7e3b5c5ecf9f23bddbf94b052
d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3
372ef724cb2ba60abccfa7f0ac12e571059a3b28620a54a97a163a9b5a7205f8
59eced24086396408057708d32f922904341fca0cbd41884dc8e7359c3f50327
37c09235f5b6487dfc9689210d35b039a3ab2e74426c4284e4c7119269bc9104
a0b93473fe0aa4e5df49542aea136c8b037d85e4bae90eb5f55922e18ce6b804
720264d1cb886a1fa9bb5f807acf3677a82701e8e0fc25e65d03252bb7c8f69f
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32
df52744df9ff4bd8dfb0b6e6e86f94d1d885caba0f2deb2f8a429978b475508a
6be1f66c2715c6e4e9e535375607880080dd5a110326e80418d224b129aa50e2
2a64d3212309da646f5ef8210f6b8966c7a63ce82cb5bbd3c03838dd296badcf
4a7ce095400f7f3f613c9ea581084cb7756874d13301030b8955611a408dc312
357f7d8ce29a87629b8d9ab9230362cca864c3bb6a010e783290838d405626cb
f888c4770bbbbcad15c357d6731ff8f5afd7e62e4c35652f3dc3ede6c36b66e9
bbadbf3fdbbf1e1d3b0990bbd18ab566cc3028538d4fab8981d0f8505d44349a
2d09a6edc78299bdcb7c4094e75f30a334fb3cc53aa63529e22862f9f563b32e
e4bc932751053ca7710ced80639899db651a4addacf9c05811c0e8ab1842eb66
81bf08f12cdd41902982c5bfb43b2ebcc327a47e24d8d17a085349081138c1f7
489c3b4e65ec46019d1b57f2485c8862d3904e85994280a41d5271903386f07f
70a576a39497248cdc4e1510b0b210abc5c4fbc702fe00f69d4ed1f6f50ce7f8
ec81c38ff89da4f91aff94a7ae635adef1e8a4eb07f6ee5eb3f1908e33fb1a19
4aa035616ed50d2ca3d86455ef14e5c306d072b3942d25ce570b519b0cb142d6
00d76b06a5f9a7d23c7fc78c9f83b08d84e4a8a84e8da0a852ec0f6c5e65e771
0e4a730c64635bfe562af7d6e8c8fbea0e61a81780c2a3b9b562c550db5017ba
f5cd003d079d427c2ffb80fd91788083b66b624a2ead6ee8a2963a8f93b0707b
SH256 hash:
d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3
MD5 hash:
05971e8521240cd588015e689baab4b7
SHA1 hash:
1911d514d8e9d3310b2876ee591553250a31f44f
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RSharedStrings
Author:Katie Kleemola
Description:identifiers for remote and gmremote
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments