MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 de96b58170192186f3f118155903287e871cd7c2950900645367527129b375eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: de96b58170192186f3f118155903287e871cd7c2950900645367527129b375eb
SHA3-384 hash: 6616284a0a6b1fc6e45dcd18d7baaa95be955fbc28d1f4f3e239a5316b7a8ed577ab7a22a21d677e8a78792422f7a7a7
SHA1 hash: b99fc454dd29e5d97d009b2d9ef7a0944edce92e
MD5 hash: c2d148bbbbd2ad65ddbb2c8d8d182711
humanhash: potato-alaska-lamp-beer
File name:Factura comercial.pdf.exe
Download: download sample
Signature AgentTesla
File size:645'120 bytes
First seen:2023-07-28 06:53:24 UTC
Last seen:2023-07-28 12:41:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:vbO5HcDoE+0qvHTMXfBepcaiY4Je0cR7aviz7ij0CwVyvUtbO5:zOyNkPTYfBEcaiY4Je0O7avizOj0CwVC
Threatray 5'725 similar samples on MalwareBazaar
TLSH T15CD412521CD34B31D85E47B28C641B4D9336FFF81ED5DB08A9EA58889E073358606DAF
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon d08cb6b6b6b68cd0 (6 x AgentTesla, 2 x SnakeKeylogger, 1 x Formbook)
Reporter abuse_ch
Tags:AgentTesla DHL exe


Avatar
abuse_ch
AgentTesla SMTP exfil server:
colicontjal.org.mx:587

Intelligence


File Origin
# of uploads :
3
# of downloads :
262
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
Factura comercial.pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-07-28 06:58:19 UTC
Tags:
agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-07-27 16:57:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
3cc0f656c40de38bfa391c602d3b1e44d2ea7333a5e809cdd292f83f0aafa1fa
MD5 hash:
fe66a044635dd628cf74f11901f330b0
SHA1 hash:
fac89d09ccf9c882f40e959993adc14fecb8859d
SH256 hash:
3f68cc843eb3b2a764dc02355e2e3f97dce8f1164d6f18a4f77e850410dfc137
MD5 hash:
60126f10641986bbcefca9ed6159994b
SHA1 hash:
df584155d49b10805f1f0d81a758e98b23990815
SH256 hash:
b72e67d320983791630cb11d5f73958d939226f70254cbffd4ef3f160d7cd63f
MD5 hash:
bcae1924fa9fdac9dacf286538684fb5
SHA1 hash:
65713977f63fbaf4557bd7fe414581b982cbf6f6
SH256 hash:
10278cf5ab1c5f5546dfb1304bbda18ca675a0e8e1349dcb0ef31ed6194faf8c
MD5 hash:
38fac24186205e7e454668f493ee4be8
SHA1 hash:
0c0b6cf267e9ce8bee16231bd1de791cd19cbb0c
Detections:
AgentTeslaXorStringsNet
Parent samples :
10278cf5ab1c5f5546dfb1304bbda18ca675a0e8e1349dcb0ef31ed6194faf8c
d975b68c91c59dddb7b6777f6f2f78300ddd9be5c51f483994ea26106839a017
fa882068acfc15aaea82a925df6e6bf21a2c24c114f7f382cf524431690c4b0f
7b37b945add0e6c872027313e3e011bf368c5cd038d48d3f719e6f08927af861
de96b58170192186f3f118155903287e871cd7c2950900645367527129b375eb
865a96900b64bb3aca2d50dd65ab111ec881db5935f1dfd753dc48ce6cf21532
86233dde1f7f4fc654835a61c19c671d221a8b6c60c2b8bf47971a09a9b834fc
17b7a8bce60617c9f97a3464bbdba87d94da9c08b533fc07f3727376feae538d
798a1dd333191702e1ada41a7d113ebf25f611e17562d9466d0bfed0d0f87271
e3699bdedcf4bebffc1e2e2af639da53dc9abd0e7bcb4e917def61a01a880b69
bec9d10adb4629b7438c1450a378f704130f925170978084564a89c2e5f8ccb0
ed51a8f4dbf107d4fc9a3d91d8f5876a263fb70ee91d5acca02702de8aac01f8
23a188b67111d6c67ba62e1588479154ca23c4c65d768a662b873757a3419ed0
845bd19a89db0310a363f915e1e92d5e1d2943bd4cb0f9422368d563de2d850d
94688cb7dc0518d6dd77ca23bc6b591bb2be55d9006d91e3ef074b96ab638842
b905e2aaf41c07e00b4daf4c1d473a43880057be0c95268a5c4eb8c838f80c2f
7c35caefea294401fee0251043f126c752de452da6e0376e5f959f6dcc688796
6c42ee7167cd0229fd37b09bbfdd37f5454786457284a4c97583832d86af01e2
0b282c5279640f86929276ce1a52be1ec7e892701954362e5568f254101880b5
74a84823c35436e2a73f303aaf86be5d2c59f025c948c0044f948d613da91870
6703706a8c532bece036e36fc650fc082b04c5b771e5c2458adf28fdc667ad97
f74c6a3def1ced2a6e4bc81fec1b4f062eba67ce271ca4a47271631986a6d1c3
ca5c1fefe9b9347b995dc040b7e50b867be70729041afffd475ce7856f394f5b
bccc2a1036cae75070c4f2df937c91cd36f718a7956103abe42b99d01b4ae044
197340e586131099b95d8d2fb46791806f018fd643172e841cde25bd436b90d8
7df6c33cbd852c467ef5a454451436e31a48d360a4959224e11a79ab4ad10f91
f1766635b1f5e7015ff13d8b6998366b45550d8be505f002b8e6192db3e503e7
be10a38e0b54ec2152d5b6094ebe296db7ad897445a7d5a4b1bd82789437dd65
SH256 hash:
de96b58170192186f3f118155903287e871cd7c2950900645367527129b375eb
MD5 hash:
c2d148bbbbd2ad65ddbb2c8d8d182711
SHA1 hash:
b99fc454dd29e5d97d009b2d9ef7a0944edce92e
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe de96b58170192186f3f118155903287e871cd7c2950900645367527129b375eb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments