MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed817c297bb2d98e89f3534b4936cc40d5829d7812c6ae0768a774f16685ae08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: ed817c297bb2d98e89f3534b4936cc40d5829d7812c6ae0768a774f16685ae08
SHA3-384 hash: e161b11fa2132d6358ab3d74a199da13383cf9ef505129e5182b384425d4b35cd08feff4f9c26ff0dc4b1477b428b50a
SHA1 hash: 44011598c5279c746351451f43af333a67479c61
MD5 hash: 7d494865be6a5a69e206b935379af1d4
humanhash: oregon-monkey-south-avocado
File name:Swift copy.exe
Download: download sample
Signature AgentTesla
File size:787'968 bytes
First seen:2022-02-15 12:48:53 UTC
Last seen:2022-02-15 14:52:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:F55k+YEUes9eMJqXHPXdt3O6Mj7gKEDszLyGhUAwW7l59B4b3W5rV:nai+bsXP333Mj7gBsLytAwEhvJV
Threatray 15'136 similar samples on MalwareBazaar
TLSH T15CF4010073B73B90C47707FA84A5919A1BB9A2AD5136E77DCD9274C94C527C0CA3BA3B
File icon (PE):PE icon
dhash icon 0012360d4d1e8606 (19 x AgentTesla, 12 x Formbook, 4 x SnakeKeylogger)
Reporter cocaman
Tags:AgentTesla exe SWIFT

Intelligence


File Origin
# of uploads :
2
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Swift copy.exe
Verdict:
Suspicious activity
Analysis date:
2022-02-15 16:08:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed update.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 572553 Sample: Swift copy.exe Startdate: 15/02/2022 Architecture: WINDOWS Score: 100 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 7 other signatures 2->44 6 Swift copy.exe 3 2->6         started        10 nwlrFL.exe 3 2->10         started        12 nwlrFL.exe 2 2->12         started        process3 file4 32 C:\Users\user\AppData\...\Swift copy.exe.log, ASCII 6->32 dropped 46 Injects a PE file into a foreign processes 6->46 14 Swift copy.exe 2 5 6->14         started        18 Swift copy.exe 6->18         started        20 Swift copy.exe 6->20         started        48 Multi AV Scanner detection for dropped file 10->48 22 nwlrFL.exe 10->22         started        24 nwlrFL.exe 10->24         started        26 nwlrFL.exe 10->26         started        28 nwlrFL.exe 12->28         started        30 nwlrFL.exe 12->30         started        signatures5 process6 file7 34 C:\Users\user\AppData\Roaming\...\nwlrFL.exe, PE32 14->34 dropped 36 C:\Users\user\...\nwlrFL.exe:Zone.Identifier, ASCII 14->36 dropped 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->50 signatures8
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-02-15 10:31:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
63b6403c6ea1378c0ff49f069597b45496dba6c0161d240e64885ab6f0806d04
MD5 hash:
72b143fd989c37772556bf302ac33be1
SHA1 hash:
ee377db4778e70261d34f8210208069df41a12ef
SH256 hash:
d89f0ac679f6b2e77e6f15ddb342461c7616359a2bf003a1848ca87072f07089
MD5 hash:
59a814fe443b2f8664b6c7ddf1294b9f
SHA1 hash:
e91c2f9d501110d9f7a92f2aa628627a19b69b8f
SH256 hash:
f0f62fdeebde6e1830811d9bc10244d72ad207a428077f4b6afac855ad49a77d
MD5 hash:
ef6c98b6e1f9cb87d10388d92b26d682
SHA1 hash:
9790f6320558bbc4164d14067fbaa790ebd97737
SH256 hash:
cca2535e13488f55420ec67857437d401095bfaa4c4125322e9d15b670b8a450
MD5 hash:
b3f40ea8b6f95fe5bf9ecbf30199d7e4
SHA1 hash:
41a85138aeef70921c9c3da637e232cb12fdedd6
SH256 hash:
ed817c297bb2d98e89f3534b4936cc40d5829d7812c6ae0768a774f16685ae08
MD5 hash:
7d494865be6a5a69e206b935379af1d4
SHA1 hash:
44011598c5279c746351451f43af333a67479c61
Malware family:
Agent Tesla v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe ed817c297bb2d98e89f3534b4936cc40d5829d7812c6ae0768a774f16685ae08

(this sample)

Comments