MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cacede7d5990b1b6e80e61bf380a37f2acc9ae603b9f2cf30d7c8997f2c5635. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 0cacede7d5990b1b6e80e61bf380a37f2acc9ae603b9f2cf30d7c8997f2c5635
SHA3-384 hash: 17340be8aeffc4b21be5d6825186a52104b9db9a37a1d4a263fbcf3c2a5b4abe1aacaac10081215759a3d638db6a830f
SHA1 hash: e9cb87b86d54c86359eac148ddbe3fde5e6bd20b
MD5 hash: 90383fc2786689bd8f81f99ac68fd29e
humanhash: winner-romeo-butter-massachusetts
File name:szd53x7t.rar
Download: download sample
Signature AgentTesla
File size:147'573 bytes
First seen:2026-04-13 23:12:26 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 3072:GjPS3OESE6T+aRCuyDTOWCuy0UUTlxe9MVpomKHfqCf30AcJ99Ibjzb:xGCuqDrLmM0vfkD99Sj3
TLSH T1BCE312D63BEFF8170D03DFDE644777B24E286A7C2A4C2D4919640386DCA92E6D1C8D92
TrID 58.3% (.RAR) RAR compressed archive (v-4.x) (7000/1)
41.6% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter BastianHein
Tags:AgentTesla rar

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
CL CL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:ORDINI.exe
File size:577'536 bytes
SHA256 hash: 2a66517cedacb808725403d02b88dbdd47067f29fd2ae957b90ca22460bf0f23
MD5 hash: 678a50026f858442c0e4736efcc7a832
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
injector trojware blic
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
visual_basic
Verdict:
Malicious
File Type:
rar
First seen:
2026-04-13T18:05:00Z UTC
Last seen:
2026-04-15T13:55:00Z UTC
Hits:
~10
Gathering data
Threat name:
Win32.Trojan.Ravartar
Status:
Malicious
First seen:
2026-04-13 21:59:25 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments