MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddb3e78ed4aa9ec9eaf53385fbc35a8b96e542b501b289bb81285eb381f4e923. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ddb3e78ed4aa9ec9eaf53385fbc35a8b96e542b501b289bb81285eb381f4e923
SHA3-384 hash: 498c394542c7af63f5c32e054057ebb6b1498eafe60710d986bcad22550f6e80470291a6512ee825180a649581b379f9
SHA1 hash: 86f73a5125e2376068552f66b5a6f94a3ce2e8f3
MD5 hash: f157826eca71995a7772050f292cdf45
humanhash: cup-equal-angel-xray
File name:Sipariş sorgulama 19-04-22.msi
Download: download sample
Signature AgentTesla
File size:327'680 bytes
First seen:2022-04-20 09:10:53 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 6144:O0qOx0LfBO0nSjR051PKZ+4zSJLCOvQCDNCGeSHY8wu52CIhVqnjILfR7:Hqq09FPoLzGCaDNCZ9uAnujy
Threatray 1'640 similar samples on MalwareBazaar
TLSH T10A64120B7C888739D2110E322E2F87945726BD445EAF213E5560B7CC6FBB5C6027A5F2
TrID 86.8% (.MSI) Microsoft Windows Installer (454500/1/170)
11.6% (.MST) Windows SDK Setup Transform script (61000/1/5)
1.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter abuse_ch
Tags:AgentTesla geo msi TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Found Tor onion address
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Capture Wi-Fi password
Sigma detected: Koadic Execution
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses ping.exe to check the status of other devices and networks
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 611918 Sample: Sipari#U015f sorgulama 19-0... Startdate: 20/04/2022 Architecture: WINDOWS Score: 100 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for URL or domain 2->49 51 Sigma detected: Capture Wi-Fi password 2->51 53 5 other signatures 2->53 8 msiexec.exe 84 27 2->8         started        11 msiexec.exe 3 2->11         started        process3 file4 33 tmpmsi_A6afc7e4030b7a5fe748ac410329a.exe, PE32 8->33 dropped 13 tmpmsi_A6afc7e4030b7a5fe748ac410329a.exe 13 1 8->13         started        process5 dnsIp6 37 ip-api.com 208.95.112.1, 49173, 80 TUT-ASUS United States 13->37 39 46.173.214.33, 19797, 49174 GARANT-PARK-INTERNETRU Russian Federation 13->39 55 Antivirus detection for dropped file 13->55 57 Multi AV Scanner detection for dropped file 13->57 59 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->59 61 7 other signatures 13->61 17 cmd.exe 13->17         started        20 cmd.exe 13->20         started        signatures7 process8 signatures9 41 Uses ping.exe to check the status of other devices and networks 17->41 43 Uses netsh to modify the Windows network and firewall settings 17->43 45 Tries to harvest and steal WLAN passwords 17->45 22 netsh.exe 17->22         started        24 findstr.exe 17->24         started        26 chcp.com 17->26         started        28 PING.EXE 20->28         started        31 chcp.com 20->31         started        process10 dnsIp11 35 127.0.0.1 unknown unknown 28->35
Threat name:
ByteCode-MSIL.Trojan.SpywareX
Status:
Malicious
First seen:
2022-04-19 19:21:52 UTC
File Type:
Binary (Archive)
Extracted files:
23
AV detection:
20 of 41 (48.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Windows directory
Accesses Microsoft Outlook profiles
Enumerates connected drives
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments