MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb97c2ba31d1a430dd7736427764e211e85612876845808e01828ee6cbfb3bad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: fb97c2ba31d1a430dd7736427764e211e85612876845808e01828ee6cbfb3bad
SHA3-384 hash: c8a0fbfc5b4fd4fc9ea2828ba2b7cacc24a4852062f825f3c05f79540664d5ef92cd3dc2b1aa9befa4ddba978f91ebc2
SHA1 hash: 25c99e29e32ee3f3a7b517a7efff5f5b8f213d2a
MD5 hash: 63f15c79b31081b71d82693c2a9fd122
humanhash: hydrogen-emma-arizona-fourteen
File name:rCOTAÇÃO202305-15017_preçoeprazoentrega_pdf.exe
Download: download sample
Signature AgentTesla
File size:720'896 bytes
First seen:2023-05-15 11:58:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:nysSx17rA9X6XnhFxdhP0bVZqTZotnAgXHeFmTz:k17rA90hFxdhP0D938o
Threatray 3'479 similar samples on MalwareBazaar
TLSH T14CE4E111B1FE446BC7A953F141481A480BB451AB7D27D6F80D9F30DAEED2F021B62EA7
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 8b3b1b5333535b2b (2 x AgentTesla)
Reporter FXOLabs
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
BR BR
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
rCOTAÇÃO202305-15017_preçoeprazoentrega_pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-05-15 12:03:20 UTC
Tags:
agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected Generic Downloader
Yara detected Telegram RAT
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 866679 Sample: rCOTA#U00c7#U00c3O202305-15... Startdate: 15/05/2023 Architecture: WINDOWS Score: 100 28 Found malware configuration 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 6 other signatures 2->34 6 rCOTA#U00c7#U00c3O202305-15017_pre#U00e7oeprazoentrega_pdf.exe 3 2->6         started        10 kmk.exe 3 2->10         started        12 kmk.exe 2 2->12         started        process3 file4 22 rCOTA#U00c7#U00c3O...entrega_pdf.exe.log, ASCII 6->22 dropped 36 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->36 38 Injects a PE file into a foreign processes 6->38 14 rCOTA#U00c7#U00c3O202305-15017_pre#U00e7oeprazoentrega_pdf.exe 2 5 6->14         started        40 Multi AV Scanner detection for dropped file 10->40 18 kmk.exe 2 10->18         started        20 kmk.exe 2 12->20         started        signatures5 process6 file7 24 C:\Users\user\AppData\Roaming\kmk\kmk.exe, PE32 14->24 dropped 26 C:\Users\user\...\kmk.exe:Zone.Identifier, ASCII 14->26 dropped 42 Tries to steal Mail credentials (via file / registry access) 14->42 44 Tries to harvest and steal browser information (history, passwords, etc) 14->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->46 48 Installs a global keyboard hook 14->48 signatures8
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-15 05:22:16 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla payload
AgentTesla
Malware Config
C2 Extraction:
https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocument
Unpacked files
SH256 hash:
cf1bdb8826665e49a71e52ab00062a7460587b132bcd06d91fb2dc858ed632ab
MD5 hash:
eed9fe3bd06cc38a83c990f5b01e4650
SHA1 hash:
f76cc7b8d8042d778b1a95d5134675dd75d04df2
SH256 hash:
fbc02c3151bf5e0071db721f9d02b2003f896d4d14a6f4e91a336b386c678e04
MD5 hash:
1e302f38d0015490410265839870145a
SHA1 hash:
d87da41895d82b0254df1b42135df2a71a3a4645
Detections:
AgentTesla
Parent samples :
a009cd8f77046e4c25056e947aa29339ee0dc1573e85761d34800dd59fb01c44
832d243861035e21f268e5dd0ef03dc289a9448aca36cdae4449bbc7cb30d0da
111c471f228327cd97eee55f473fad712fd7ec306bd3dd78e1d7b0bbde62ee8e
5c571a20aef5d31ad3edbfd65e33540201dde1f9ccf5eaae84332f1bf1e09ea2
4771ef53400b867c3f6c7344bffc1cb8c67ca393c42c684fcc0da75f0be7c9b3
842f0c665fdc15b778d33347d736ef588e9d3e66de357341bdebdf80d6016f85
76e76f48e5fa09f8e5f6b39845b68aad60cc1c51cb7dde5dd73f447af81d598d
fcc25306af03afb387bf3392f7b79ed113b4a706a8fc051ff56a1873dbbb2533
66d48f15c330f7f3417425e466b07ece2aa1b8eb52e825fbd17a51a7ed47d950
532ebdd89de621d2c1ba68001f654e4c1cb1e489cf058d2a71f3122e713a1ae0
29eed0d6a1854d6ae9a45e6ba66ea6cef25a4175a1fff52937fae7fe5dc9813e
fbc02c3151bf5e0071db721f9d02b2003f896d4d14a6f4e91a336b386c678e04
c35f5628ce732e68db93ad298258fc47439cd4619f48ce150d0a3cb14d3c05a9
80cc7d6a260ad6c2c0c88ddc2160f78941eefeacb6c4445de87fb47d24555520
929030c5ca3c01f22c8ecbb5fc41e507dd872c8215995aa40312e8d83df4a718
37d7b61df2aaf3b4689901ae815ac9cd39b5eec6041aeca20bd5fc419ab1635d
2492388a2635baa1438388add6c7c6c71d1793bb8b84757daf0b06f787543b39
7d1647f70a8f55be8af6553408fc9769384643796f3a6813d119ad8b90110b62
fb97c2ba31d1a430dd7736427764e211e85612876845808e01828ee6cbfb3bad
c61f9a6ae0d938b01eed42453cdd185dcec2efb4aa80fb59530e9409edc660dc
8c4593fe0a096ee5d84af4a962d9ab51809ee74104cccbd906ddddb0ff7862a7
1aad8a04f82d296e91f7fa3d3c0ec03ae6eb0239f1bc43e8d2dbdc70772ccc94
b8f93ed64ae3d45de335e197bd70e9262b9921a7beb6d95e27dc5362007004df
622bcc303ad9f9ce3bcf7017f83f9925842ec3bf07e8098882b4b83b840900ae
2fe3221aa9dff870b2112bf96ed78c99ef06d99dedc3b103f061cced424c1cff
7a8572538d238ecc9522afd19cdbf90ba4562b3c075f2b4d6b070e29fc565f0b
be06d327419c53584beff876b97e9620c5e47b1cdca45d895d059cc2ed3644f7
53823b0378b9a17181fef455b3625e7909e703d600b480ffccc9a1c6d4232c4a
088dece027bdaff18c0f6ba9aecc17d2e55bc901ccfef1bbd02ca1f6eb367b1b
5fe5a55457de5cc7d0042b3d4bd4d60f30340e31cb4ca60fcb775a393dd0ae6d
a100e5e24940580c8495a2441cc69dc3f857cfc1ac305a3015490ff982602632
6ba348dfac24550cca10be771bafa25a19f9baca0651f4467c71b8974a163061
1bc1ac224316cfcb413c21272df7decee117475ad889790b0762342ed820337f
225b5222006b81872d4a02968f11227da74152b1835738911b11c74b867e091c
42095d74354ea78bd1e905646f1889a6849acfe9f32a84e84232507ae292933b
4da6365d418ffcdd935ceb67deb6bee4dc21f70d040498eff6989e17e0fbfc39
da6e24a043796eba3925f6438d32166b8ef7b9f0f4417d039169330ef3bce8d9
c05124a691aadde7935955fc41a1539398fe2007927ef19e27d8764cbafe266d
SH256 hash:
16c255190eaaf1b60ec7d07abcac5f614ea197cee2416ca9d01bb563c526c87d
MD5 hash:
fb4ed205b442f470bbf10913128efdcb
SHA1 hash:
9a0a4c5ae429769e3253a9a3daefa24270b87a5b
SH256 hash:
26f9bbb581c77d5b88a2a372a5ac02d0ea8106ca0e8823cb3d9e76f61fd1b8f8
MD5 hash:
403c14085d61ec805ccba1984900be37
SHA1 hash:
876fd6845579812abc37bb80425f276c57268581
SH256 hash:
3d528222fc060d817fdcb9b8c276865b039f07856b1d4bda9c68f3ed26b4a54a
MD5 hash:
a7b7aa295c41d8a1e7c302b2e4eaff3b
SHA1 hash:
0b6977a5f76b3fce5f511b7a9c82dda8171ad44d
SH256 hash:
fb97c2ba31d1a430dd7736427764e211e85612876845808e01828ee6cbfb3bad
MD5 hash:
63f15c79b31081b71d82693c2a9fd122
SHA1 hash:
25c99e29e32ee3f3a7b517a7efff5f5b8f213d2a
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekSHen
Description:AgentTeslaV3 infostealer payload
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_AgentTesla_d3ac2b2f
Author:Elastic Security
Rule name:win_agent_tesla_ab4444e9
Author:Johannes Bader
Description:detects Agent Tesla
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe fb97c2ba31d1a430dd7736427764e211e85612876845808e01828ee6cbfb3bad

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments