MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 4 File information Comments

SHA256 hash: fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5
SHA3-384 hash: 311a51b938dee489a9cff59054eb59272480f2d30b97c2b3d339a478f60bda4f27d108447690d1308c54558e99ec5e80
SHA1 hash: 43de15f3f5b215e05f147c3c10a4bf704f0c77e6
MD5 hash: 9a84501c87a8c1daaea8d11eaad9482f
humanhash: zulu-carolina-lactose-ack
File name:e-dekont_html.scr
Download: download sample
Signature AgentTesla
File size:752'640 bytes
First seen:2024-04-15 13:07:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:WeFDuvzT3708Lifz9OORcdxEHMVk75Voh/xGrkWw9g1vWzpq4LEL4KTGGx8FtHrS:WeF6AY09OxRK4h/x2Fwu1v+hL
TLSH T180F4F0983640B6DFC867CE77CAA41C24A661A467030BEB43559726DCD90EADBCF142F3
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon e9e098ae9aba8ab2 (12 x AgentTesla, 2 x Formbook, 1 x DarkCloud)
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
307
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5.exe
Verdict:
Malicious activity
Analysis date:
2024-04-15 13:12:32 UTC
Tags:
stealer agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
DNS request
Connection attempt
Sending a custom TCP request
Forced shutdown of a system process
Stealing user critical data
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1426089 Sample: e-dekont_html.scr.exe Startdate: 15/04/2024 Architecture: WINDOWS Score: 100 46 cp8nl.hyperhost.ua 2->46 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Sigma detected: Scheduled temp file as task from temp location 2->54 56 8 other signatures 2->56 8 e-dekont_html.scr.exe 7 2->8         started        12 TibfjwPo.exe 5 2->12         started        signatures3 process4 file5 42 C:\Users\user\AppData\Roaming\TibfjwPo.exe, PE32 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp9A01.tmp, XML 8->44 dropped 58 Detected unpacking (changes PE section rights) 8->58 60 Detected unpacking (overwrites its own PE header) 8->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 8->62 70 3 other signatures 8->70 14 RegSvcs.exe 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        64 Multi AV Scanner detection for dropped file 12->64 66 Machine Learning detection for dropped file 12->66 68 Writes to foreign memory regions 12->68 24 RegSvcs.exe 12->24         started        26 schtasks.exe 12->26         started        28 RegSvcs.exe 12->28         started        30 2 other processes 12->30 signatures6 process7 dnsIp8 48 cp8nl.hyperhost.ua 185.174.175.187, 49735, 49738, 587 ITLDC-NLUA Ukraine 14->48 72 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->72 74 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->74 76 Tries to steal Mail credentials (via file / registry access) 14->76 78 Loading BitLocker PowerShell Module 18->78 32 WmiPrvSE.exe 18->32         started        34 conhost.exe 18->34         started        36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        80 Tries to harvest and steal browser information (history, passwords, etc) 24->80 40 conhost.exe 26->40         started        signatures9 process10
Threat name:
Win32.Spyware.Negasteal
Status:
Malicious
First seen:
2024-04-15 12:34:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
16 of 24 (66.67%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
agenttesla_v4 agenttesla
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
AgentTesla
Unpacked files
SH256 hash:
5688052489392c2ca7179722bfb5ad4883db768cbad0d344c329dff69ddde94e
MD5 hash:
990f3e5448706e10108c3108971d07a5
SHA1 hash:
cf0011a08216722addbb5634c09be07e3691b872
SH256 hash:
65b6f08b0afdd2fba6350b4dddc5c3cf0a32e018bcf9a34788c1e966c5ffa0b0
MD5 hash:
792572dfa33c7ff5ad191c990f35abab
SHA1 hash:
937bb37d9d5eca86cc6ab0d41074f76d91eed432
SH256 hash:
fd1ecc110c0133a6f1930ad125775ff62f9f93b553b59c075216e73a741526fb
MD5 hash:
8c024b7fa0417a269a8dbf60612275b4
SHA1 hash:
74740bd42df5423238e72ee1292757f35c986fa6
SH256 hash:
f3c655b7405b888e1b70fc1514624e6679d5275195124dab147d676335a14564
MD5 hash:
6a0dd0417a45366517804ad211553702
SHA1 hash:
005ed2faba3389af1df01ab5a3079b82402c8f75
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Parent samples :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 hash:
fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5
MD5 hash:
9a84501c87a8c1daaea8d11eaad9482f
SHA1 hash:
43de15f3f5b215e05f147c3c10a4bf704f0c77e6
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe fe8740d99ceab2db3f8d780de23b7d42daa2918cfbdd7c4be197119132bdccb5

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments