MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0a3247dd909ae3c546e45891109b28ea158c0be38913a658b065e980f48a991. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f0a3247dd909ae3c546e45891109b28ea158c0be38913a658b065e980f48a991
SHA3-384 hash: a2581c272610d710b6566d9d3b622cf81ef3451ce257eac415135255926648cbbde9e8e544680c9fcc56abd5958f91a4
SHA1 hash: 58897570838af026f2d15daf699ae19f296a41e6
MD5 hash: 8f5ed14139e843b49ca8fd1a09d66b56
humanhash: fix-spring-kilo-don
File name:mr kesh.bat
Download: download sample
Signature AgentTesla
File size:8'192 bytes
First seen:2021-01-25 06:19:28 UTC
Last seen:2021-01-25 07:50:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 96:5mc/pv5p8QUgiC6XJ56dzPlYok4CdGz+mWKu+JSTGfHdQ9e8/A0Zh:0c/pv5pbMCGJoBPlZVMYjW1+JSudQG0
Threatray 2'272 similar samples on MalwareBazaar
TLSH 83F19404F388AF23C97D7B791253151933B796C22B6BDF226F9D4AD1A8035CA0E1E749
Reporter cocaman
Tags:AgentTesla bat

Intelligence


File Origin
# of uploads :
2
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
mr kesh.bat
Verdict:
Malicious activity
Analysis date:
2021-01-25 06:24:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Sending a UDP request
Using the Windows Management Instrumentation requests
Sending an HTTP GET request to an infection source
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Found malware configuration
Installs a global keyboard hook
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-01-25 02:47:43 UTC
File Type:
PE (.Net Exe)
AV detection:
9 of 44 (20.45%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
f0a3247dd909ae3c546e45891109b28ea158c0be38913a658b065e980f48a991
MD5 hash:
8f5ed14139e843b49ca8fd1a09d66b56
SHA1 hash:
58897570838af026f2d15daf699ae19f296a41e6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe f0a3247dd909ae3c546e45891109b28ea158c0be38913a658b065e980f48a991

(this sample)

Comments