MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc9a9c10b989fb790466a432945be2a122151bd634013222bfd87469a9f4d584. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 16 File information Comments

SHA256 hash: fc9a9c10b989fb790466a432945be2a122151bd634013222bfd87469a9f4d584
SHA3-384 hash: c3c3708978bba097ef62fe2bc5f0bda0cbaa6319ce7a00e7e5f89921919207f685f7b44e57ff58f7ebd31a1035660661
SHA1 hash: d3af842d5711d09680b2d028a5833de42d336691
MD5 hash: a1d6f3b4ade2acc9a20fe0d648f4f0f0
humanhash: hamper-leopard-three-lamp
File name:SKM 60DTB5100391.exe
Download: download sample
Signature AgentTesla
File size:664'064 bytes
First seen:2024-03-21 13:19:21 UTC
Last seen:2024-03-21 15:33:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:foMC7Npp/VEq0/fptAVzJiijbEasoXvYwz/wxF7ufHnxcF:gPN/VEq0/fptAVzgijRs6vYwzIXufHnq
Threatray 1'914 similar samples on MalwareBazaar
TLSH T109E4221222BA37A1F9BA87F64D5885C117B8F99B9151F34D1DC6E6DF2A18F004F10E27
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter James_inthe_box
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
337
Origin country :
US US
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
fc9a9c10b989fb790466a432945be2a122151bd634013222bfd87469a9f4d584.exe
Verdict:
Malicious activity
Analysis date:
2024-03-21 13:21:24 UTC
Tags:
agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Sending an HTTP GET request
Moving a file to the Program Files subdirectory
Replacing files
Forced shutdown of a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1413239 Sample: SKM 60DTB5100391.exe Startdate: 21/03/2024 Architecture: WINDOWS Score: 100 53 mail.cyber.net.pk 2->53 55 fp2e7a.wpc.phicdn.net 2->55 57 3 other IPs or domains 2->57 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Sigma detected: Scheduled temp file as task from temp location 2->67 69 10 other signatures 2->69 8 SKM 60DTB5100391.exe 7 2->8         started        12 lKetNsIJNmne.exe 5 2->12         started        14 fcTKUQ.exe 2->14         started        16 fcTKUQ.exe 2->16         started        signatures3 process4 file5 49 C:\Users\user\AppData\...\lKetNsIJNmne.exe, PE32 8->49 dropped 51 C:\Users\user\AppData\Local\...\tmp307D.tmp, XML 8->51 dropped 81 Writes to foreign memory regions 8->81 83 Allocates memory in foreign processes 8->83 85 Adds a directory exclusion to Windows Defender 8->85 18 RegSvcs.exe 17 6 8->18         started        23 powershell.exe 23 8->23         started        25 powershell.exe 23 8->25         started        27 schtasks.exe 1 8->27         started        87 Multi AV Scanner detection for dropped file 12->87 89 Machine Learning detection for dropped file 12->89 91 Injects a PE file into a foreign processes 12->91 29 RegSvcs.exe 12->29         started        31 schtasks.exe 12->31         started        33 conhost.exe 14->33         started        35 conhost.exe 16->35         started        signatures6 process7 dnsIp8 59 mail.cyber.net.pk 203.101.175.37, 49709, 49713, 587 CYBERNET-APCyberInternetServicesPvtLtdPK Pakistan 18->59 61 api.ipify.org 104.26.13.205, 443, 49707, 49712 CLOUDFLARENETUS United States 18->61 47 C:\Users\user\AppData\Roaming\...\fcTKUQ.exe, PE32 18->47 dropped 71 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->71 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->73 75 Tries to steal Mail credentials (via file / registry access) 18->75 37 conhost.exe 23->37         started        39 WmiPrvSE.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 27->43         started        77 Tries to harvest and steal browser information (history, passwords, etc) 29->77 79 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->79 45 conhost.exe 31->45         started        file9 signatures10 process11
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2024-03-20 08:28:45 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
23 of 38 (60.53%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
AgentTesla
Unpacked files
SH256 hash:
975d5c095a6bd20d20d1553f0ad36795517087712bdc2a18fb8516665539242e
MD5 hash:
53106229a87e970b8befe76d9118f647
SHA1 hash:
f4965d92934d4acff7ad5f4f9521a1b8fb584798
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :
37899fda8cbf74882ae5d68bcd1de525005edfb8b5b87edd42fd86c458bb998f
71ae98c7e6f3e776c17594e8007ecf47ea0209f0ca1142515e4958c02267bed9
5f834237db6598266c1127b74062bd1d92150daf483ccdb0b37f1d306494a5a4
296d5ba75c695171bc26ce33a02e4b16818bddcfdb7688011d741fb78d3dab18
fca4e12e29cf37dcc23a48f671c5dd7f8f4d473bba7754091ca1287d2b124205
d334afd3da3c629abf0772c5be572d1d7b252b9a1ad2fae0e1809d04635f3e4b
bd9a2450499f87561deff9f7862b4ca34b5afb27089b8ae90578f7ed28054808
0a2d5142d03f0dd333f371e089c5f0d5fe8c3169e4ee78d7ca23b1472b2f7b48
27aca3b944c0bbd1b6d020de7a9ef916ba170e017ba63304adfef012822cf20f
7beb85da1bc8b1c935309f219347d8534a77ba114ca4217bd60f98b4ad05836e
a775277953ea0daab3cbec4aa2b37c5e0052172c05f7d4d0e8c39894c58fabe0
771c49d7430b930313e8af81f4b89fefd3d6b6450fceab630b125a6a6d4cf11c
8d5930353d2239c66b566cb6725058657d642d766549d493f0118aa495c95106
aa33486e9090a3807a894ba0c8c918668821875e0df7a15574ea412489673e3d
f6eea72845ed2286d5faf76e537b1e94081c2fea7be4772c5f63a04e6a847795
cb348e8dbd6c518a9ad671a9fb235cea3eeba8b7036fc5498f6b118d4bc3060b
90f4e7731fc41021b7ce9f9d15704c9849cf3215161585721a370745f7392e71
d85a4e28a6003aaf9cf0a6c0bf3f5bee31eb82f39930f8ecec7657dd24093c49
00d1bd4fb6f0afc0345136a810f410fb2c1740fd8adf0793e3cf6597f9bc7447
53cbb972306a7569a1762feaa5df42ad66de898691b4cabcf1c2c35526361d8e
fb73c562937a21c54247a51c05d0e616148301cfdd24b1619f0e13191a3ab687
fc9a9c10b989fb790466a432945be2a122151bd634013222bfd87469a9f4d584
a898ed790cde47b79f0c27f18406d6e290178bea8c35788d5ac22622cfadf2b6
ad048fa92eef59c07432e25c1afa2af4853be0a301e3ea64910352373fdea51c
5762147a28aaed979353975b6f7e2d31d71fb827af0dafb991b442c30e161caa
1c98180948dc869d00e1fe42476559fae2d76e95ce809c47736aca2ed6c20970
4af0ad255ce753c34b265d5714681b436ef635cbfc8dab10349ea913547be805
b21d51bd3eae9c07144b4d2527d732227a775c18e42812eea7a6f3a84c4d3a2d
86cc6304f5610bd7836b6706c2fe5d5c1fd88ad5de23927e41a1848dddf744e1
35283152bb31940827ea64cdef4baf0f332f38b348d83dd3c34364b97f6d3d87
9dfd52d9008fad9915a2ce18b0f9e9a2dc6c513f7396d049a82faf97410950c1
2c86d6d8fe9b19bd2f24d6e424c90b9a4bee255cb10e8319427d689d32dbfc60
d24bd0ebc242b94f043fe80e7f6a48d20566689f31c55aa1ec910a2877ae9e28
b6d91bc05bcc51b0a9e9f6e605493168b1a78ccd6f234030d05461e12544cffb
dce7d8b9beeb107ab7520818cbba375962e1c6e8ace6020d1a344446498260ac
a5810d5e9262b17b5506cbfc546421debd1ddbb593ae8440c2b39793044200df
a25bdcab7a38affd0798e5d674341724726c866e7cd7348b3d75bdb47ccca230
8094dba1e87d004dcade1f0c8c15b78af99e3568d7912fa7b85cafd1e88bc83b
e1ce37159aa3f3e141d622216cc4994b7fa4014e8b094b56f34916bcd838b872
c7a16881f8c69d16a9b0bdcbfdd5c4aada81eba19521d1c03ee7f6005f7d6629
adeebc489ed24b4e3e8ca7d0db2a4fe9bfce24c7c7675d67d57712afce862a72
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743
SH256 hash:
224fb3413db08996824cb4ec415ad5f4f1c6338bf234cc6b52dc9c42a769e626
MD5 hash:
d28a5fc61d971f0e913e25ec65a72b3a
SHA1 hash:
b8010943992f935d3a9f53ab1625bb12c955eac7
SH256 hash:
b881c4bf6c05d939eb80592ab765faf55917199906bfb6ea71134a49da83b415
MD5 hash:
70bb35272438652f08256ba10b64386d
SHA1 hash:
8a4cc15f32618fb7660b7c056910f956bd86b99a
Detections:
INDICATOR_EXE_Packed_SmartAssembly
SH256 hash:
baf9cf8a28769761a99b78d1db767e100882b92ae14b73d79c37d02bc616cb6d
MD5 hash:
dd84fd8481bd61aaabbabbf1b880f154
SHA1 hash:
83f72b331ea5894cdfa561dfe9274f013e72b5c6
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
fc9a9c10b989fb790466a432945be2a122151bd634013222bfd87469a9f4d584
MD5 hash:
a1d6f3b4ade2acc9a20fe0d648f4f0f0
SHA1 hash:
d3af842d5711d09680b2d028a5833de42d336691
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Generic_Threat_9f4a80b2
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments