MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa9a560ec483160759a683077a5c9e7d5117d9d2d3ce6d0e986dc072a9d1472f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: fa9a560ec483160759a683077a5c9e7d5117d9d2d3ce6d0e986dc072a9d1472f
SHA3-384 hash: 0a40bcd46f872eb4df0a932900c4ae7b73bc0b52e48dbbb5497fcc2ef50bfc224d6e41ed106118cb31b1ec5192bdd4dc
SHA1 hash: 93ceef0884abc7fe8a0154f6b0110049808a9852
MD5 hash: 82c33f5601d9ef60c6204fe533af7d68
humanhash: jupiter-sad-diet-grey
File name:new order. PO68792 PDF.exe
Download: download sample
Signature AgentTesla
File size:706'048 bytes
First seen:2024-04-30 07:48:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:uu2iNzeWFm+R2oZPZqy1gBhPedP0WfMUtPV0wGKPUEBROz/OuZ2cof4ZnSoNwMoU:B1tRFm+RlQBBhmaWfMGVVUmc/32cvHN
Threatray 711 similar samples on MalwareBazaar
TLSH T1E9E42282359D9E33C5BF36FE116099110BF51A5F28E1D7CA1EC8A1DD0CEA7A49398393
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter cocaman
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
412
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
8c95c01d-5352-4109-a671-56cd98c7041e.zip
Verdict:
Malicious activity
Analysis date:
2024-04-30 06:40:41 UTC
Tags:
agenttesla stealer smtp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Result
Threat name:
AgentTesla, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1433927 Sample: new order. PO68792 PDF.exe Startdate: 30/04/2024 Architecture: WINDOWS Score: 100 43 mail.fascia-arch.com 2->43 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 Antivirus / Scanner detection for submitted sample 2->61 63 14 other signatures 2->63 8 new order. PO68792 PDF.exe 16 7 2->8         started        13 fSRbViWBeng.exe 2->13         started        15 chrome.exe 1 2->15         started        17 chrome.exe 2->17         started        signatures3 process4 dnsIp5 45 mail.fascia-arch.com 50.87.195.61, 49739, 49757, 49758 UNIFIEDLAYER-AS-1US United States 8->45 39 C:\Users\user\AppData\...\fSRbViWBeng.exe, PE32 8->39 dropped 41 C:\Users\user\AppData\Local\...\tmpEEF3.tmp, XML 8->41 dropped 67 Tries to steal Mail credentials (via file / registry access) 8->67 69 Tries to harvest and steal ftp login credentials 8->69 71 Tries to harvest and steal browser information (history, passwords, etc) 8->71 79 2 other signatures 8->79 19 powershell.exe 23 8->19         started        22 powershell.exe 23 8->22         started        24 schtasks.exe 1 8->24         started        73 Antivirus detection for dropped file 13->73 75 Multi AV Scanner detection for dropped file 13->75 77 Machine Learning detection for dropped file 13->77 47 192.168.2.4, 138, 443, 49723 unknown unknown 15->47 49 239.255.255.250 unknown Reserved 15->49 26 chrome.exe 15->26         started        29 chrome.exe 17->29         started        file6 signatures7 process8 dnsIp9 65 Loading BitLocker PowerShell Module 19->65 31 conhost.exe 19->31         started        33 WmiPrvSE.exe 19->33         started        35 conhost.exe 22->35         started        37 conhost.exe 24->37         started        51 plus.l.google.com 142.250.190.142, 443, 49752 GOOGLEUS United States 26->51 53 www.google.com 142.250.191.164, 443, 49738, 49743 GOOGLEUS United States 26->53 55 2 other IPs or domains 26->55 signatures10 process11
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-04-30 06:19:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
25 of 38 (65.79%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Unpacked files
SH256 hash:
c32d6c72ff80ce8dba039fb7b78eee68079d094244c2d6c44dce805d357d87f4
MD5 hash:
f0534f44e587b17515fb5e6bd1cd3d3b
SHA1 hash:
b4dc950110df4a7aee67fa5bc08d9ca98d1c2e72
SH256 hash:
4909093c1045073940daf73778f88ce3e5d4dcbc0d69e3498ad4672c2e699013
MD5 hash:
28b43a10958caef0465f7b93be0a0d77
SHA1 hash:
9c85c1cb7f6face0a6c8d0a2d2314a99092d6554
SH256 hash:
e1c622628bd86d1d3e801afb5dee83b551d223f281e937e17529190d67c2e6ae
MD5 hash:
596ff23b412ac2abc3e5c178558eacfb
SHA1 hash:
8476916e82f85f77ff4cb066110d3a14a5da67ee
SH256 hash:
be90654d1de70313ed1a7f1df854e70836cb15bf68994efa48b29c687010453b
MD5 hash:
fb43d947626f57f4ccbaec3a443b39d5
SHA1 hash:
10f61d35f858692c557fcc4c134cc87dfb843533
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
fa9a560ec483160759a683077a5c9e7d5117d9d2d3ce6d0e986dc072a9d1472f
MD5 hash:
82c33f5601d9ef60c6204fe533af7d68
SHA1 hash:
93ceef0884abc7fe8a0154f6b0110049808a9852
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe fa9a560ec483160759a683077a5c9e7d5117d9d2d3ce6d0e986dc072a9d1472f

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments