MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e657ffb001754315f6a10d766882fc481809a576fde55ff1f0158b793beac202. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: e657ffb001754315f6a10d766882fc481809a576fde55ff1f0158b793beac202
SHA3-384 hash: bc49ccef05f0dd19908bfafc85c6ad8e5cfa7b0776a49917480420d327401c165d1a7bf4b495d60318ae964b7224982f
SHA1 hash: 8f6becc21ce64e74a5d9b0bd27ac46473b4e3eff
MD5 hash: 6e36034dfac320bf8e38151f1b452ce0
humanhash: tennis-king-lactose-apart
File name:DB payment transfer receipt E3S20092257312223020.exe
Download: download sample
Signature AgentTesla
File size:944'128 bytes
First seen:2020-12-23 14:21:47 UTC
Last seen:2020-12-23 15:32:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:7C9DGK3pnGmonzKs5jPl66Iht2JlzTQpszYqbHg6fY8gNksOdjs3eRhu263bOfrr:u9DbpGrzw3wAOZakvgObMODN+
Threatray 2'171 similar samples on MalwareBazaar
TLSH 28159E243DEA5419F173AF3ACBD87489CBBEF6233703E51E64E4234A4613A41ED8157A
Reporter James_inthe_box
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
922
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DB payment transfer receipt E3S20092257312223020.exe
Verdict:
Malicious activity
Analysis date:
2020-12-23 14:24:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code contains very large strings
Binary contains a suspicious time stamp
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Moves itself to temp directory
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AgentTesla
Yara detected AntiVM_3
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.NanoBot
Status:
Malicious
First seen:
2020-12-22 21:33:55 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
e657ffb001754315f6a10d766882fc481809a576fde55ff1f0158b793beac202
MD5 hash:
6e36034dfac320bf8e38151f1b452ce0
SHA1 hash:
8f6becc21ce64e74a5d9b0bd27ac46473b4e3eff
SH256 hash:
ef382489173215f01d88307091a8c4add749bf34053be293a1b13a684c81afcd
MD5 hash:
c49803398d1c4bba767a55dcddec1087
SHA1 hash:
426b173372a1025a6de7ad7e6e5ed0fd0259c5d5
SH256 hash:
ba4abdf257008bb406b736660eb5dfd54c9675f155ba189ae6da9dcac27a2139
MD5 hash:
607cabaac5524db950e8de4c7c7ef347
SHA1 hash:
5b1a60a79535a972e9df3841a1c3e1c637c736c6
SH256 hash:
51b11613df0a8a93c9bf286ff3696c32f50b7763d78425815afaf1d8564fa186
MD5 hash:
6ecc999b80aac33f4255cd30134483ee
SHA1 hash:
86e68ae281efd6741d89eb30388040bb9e68034b
SH256 hash:
1f0a807569ff68b70974dde9bf640f279c3ad794a7b58685ea33c3f230a97c34
MD5 hash:
02647a92aa8b94cc91817e2d62d9ab74
SHA1 hash:
fff28411d0fc9655a5b5f69571552590d3837ea9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments