MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16f765586b9c9e5114601c4f4883bbf7f259f8b8e811b7099a8d907a056fc311. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA 21 File information Comments

SHA256 hash: 16f765586b9c9e5114601c4f4883bbf7f259f8b8e811b7099a8d907a056fc311
SHA3-384 hash: 00858217058fd009ae9ec50d1bd074e0e98b1a3224c252fc5b43a1c4f5232717184e459dc58c1cd3d197d0e0597f6c7e
SHA1 hash: 4741e7859e63056170c0794edf0e4a0c22be7ca4
MD5 hash: b7ccb4e14d7b0a07240f281d04904c0b
humanhash: two-nuts-paris-finch
File name:e-dekont.js
Download: download sample
Signature AgentTesla
File size:393'680 bytes
First seen:2026-04-15 07:52:27 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 6144:By3ykknqNd0lmg658m0qBYtpus4p9+pboTFJTaR/dEwC2Yis6e1CINs6BT57YM:fqNdqmgAYVe9YoTX+pdDC2VUBT57YM
Threatray 1'847 similar samples on MalwareBazaar
TLSH T15884F19871C87EE9CB6535261CBB2109F2B5CCC160489949EFA2BD4FFE71F04902A5BD
Magika javascript
Reporter abuse_ch
Tags:AgentTesla geo js TUR


Avatar
abuse_ch
AgentTesla FTP exfil server:
ftp.duct-master.com:21

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
97.4%
Tags:
vmdetect autoit emotet lien
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm encrypted obfuscated repaired snakekeylogger
Verdict:
Malicious
File Type:
js
First seen:
2026-04-15T00:09:00Z UTC
Last seen:
2026-04-16T05:53:00Z UTC
Hits:
~1000
Detections:
HEUR:Trojan-Downloader.Script.Generic Backdoor.MSIL.XWorm.c Backdoor.MSIL.XWorm.b Backdoor.MSIL.XWorm.a Backdoor.Agent.TCP.C&C Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic HEUR:Trojan-Dropper.Script.Generic Trojan.PowerShell.Cobalt.sb PDM:Trojan.Win32.Generic
Result
Threat name:
AgentTesla, XWorm
Detection:
malicious
Classification:
evad.troj.spyw.expl
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected malicious Powershell script
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Encrypted powershell cmdline option found
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential obfuscated javascript found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Child Process of AspNetCompiler
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
WScript reads language and country specific registry keys (likely country aware script)
Wscript starts Powershell (via cmd or directly)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Powershell decode and execute
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1898559 Sample: e-dekont.js Startdate: 15/04/2026 Architecture: WINDOWS Score: 100 125 keyauth.win 2->125 127 ip-api.com 2->127 137 Suricata IDS alerts for network traffic 2->137 139 Found malware configuration 2->139 141 Malicious sample detected (through community Yara rule) 2->141 143 21 other signatures 2->143 14 wscript.exe 3 2->14         started        18 svchost.exe 2->18         started        signatures3 process4 dnsIp5 123 C:\Temp\ps_D17C2dPGbhRa_1776259326610.ps1, ASCII 14->123 dropped 187 JScript performs obfuscated calls to suspicious functions 14->187 189 Suspicious powershell command line found 14->189 191 Wscript starts Powershell (via cmd or directly) 14->191 193 4 other signatures 14->193 21 powershell.exe 16 14->21         started        24 taskkill.exe 14->24         started        129 127.0.0.1 unknown unknown 18->129 file6 signatures7 process8 signatures9 159 Writes to foreign memory regions 21->159 161 Injects a PE file into a foreign processes 21->161 26 aspnet_compiler.exe 17 13 21->26         started        31 aspnet_compiler.exe 21->31         started        33 conhost.exe 21->33         started        37 5 other processes 21->37 35 conhost.exe 24->35         started        process10 dnsIp11 131 172.245.244.81, 1412, 49707, 49713 AS-COLOCROSSINGUS United States 26->131 115 C:\Users\user\AppData\Local\Temp\wmcqlk.exe, PE32 26->115 dropped 117 C:\Users\user\AppData\Local\Temp\vcvpkk.exe, PE32 26->117 dropped 119 C:\Users\user\AppData\Local\Temp\rkshbj.exe, PE32 26->119 dropped 121 2 other malicious files 26->121 dropped 175 Tries to steal Mail credentials (via file / registry access) 26->175 177 Encrypted powershell cmdline option found 26->177 179 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 26->179 39 powershell.exe 26->39         started        43 rkshbj.exe 4 26->43         started        45 wmcqlk.exe 26->45         started        47 6 other processes 26->47 181 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->181 183 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 31->183 185 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 31->185 file12 signatures13 process14 file15 111 C:\Users\user\AppData\...\3ncgwvjx.cmdline, Unicode 39->111 dropped 165 Suspicious powershell command line found 39->165 49 powershell.exe 39->49         started        51 csc.exe 39->51         started        55 conhost.exe 39->55         started        167 Binary is likely a compiled AutoIt script file 43->167 169 Switches to a custom stack to bypass stack traces 43->169 57 rkshbj.exe 2 43->57         started        59 RegSvcs.exe 43->59         started        171 Writes to foreign memory regions 45->171 173 Maps a DLL or memory area into another process 45->173 61 RegSvcs.exe 45->61         started        113 C:\Users\user\AppData\...\aspnet_compiler.exe, PE32 47->113 dropped 63 RegSvcs.exe 47->63         started        65 conhost.exe 47->65         started        67 5 other processes 47->67 signatures16 process17 file18 69 c1syps1pkch.exe 49->69         started        73 csc.exe 49->73         started        75 conhost.exe 49->75         started        99 C:\Users\user\AppData\Local\...\3ncgwvjx.dll, PE32 51->99 dropped 145 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->145 147 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 51->147 77 cvtres.exe 51->77         started        149 Binary is likely a compiled AutoIt script file 57->149 151 Writes to foreign memory regions 57->151 153 Maps a DLL or memory area into another process 57->153 79 RegSvcs.exe 57->79         started        155 Tries to steal Mail credentials (via file / registry access) 61->155 157 Tries to harvest and steal browser information (history, passwords, etc) 61->157 signatures19 process20 dnsIp21 101 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 69->101 dropped 103 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 69->103 dropped 105 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 69->105 dropped 109 58 other malicious files 69->109 dropped 163 Multi AV Scanner detection for dropped file 69->163 82 c1syps1pkch.exe 69->82         started        107 C:\Users\user\AppData\Local\...\ynsxouyi.dll, PE32 73->107 dropped 85 cvtres.exe 73->85         started        133 ip-api.com 208.95.112.1, 49708, 49709, 49710 TUT-ASUS United States 79->133 file22 signatures23 process24 signatures25 135 Tries to harvest and steal browser information (history, passwords, etc) 82->135 87 taskkill.exe 82->87         started        89 taskkill.exe 82->89         started        91 taskkill.exe 82->91         started        process26 process27 93 conhost.exe 87->93         started        95 conhost.exe 89->95         started        97 conhost.exe 91->97         started       
Gathering data
Threat name:
Script-JS.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2026-04-15 07:05:16 UTC
File Type:
Text (JavaScript)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:agenttesla family:xworm defense_evasion discovery execution keylogger pyinstaller rat spyware stealer trojan upx
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Detects Pyinstaller
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
AutoIT Executable
ConfuserEx .NET packer
Suspicious use of SetThreadContext
UPX packed file
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Family: AgentTesla
Family: Xworm
Malware Config
C2 Extraction:
172.245.244.81:1412
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ByteCode_MSIL_Backdoor_AsyncRAT
Author:ReversingLabs
Description:Yara rule that detects AsyncRAT backdoor.
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_XWorm_b7d6eaa8
Author:Elastic Security
Rule name:win_xworm_bytestring
Author:Matthew @ Embee_Research
Description:Detects bytestring present in unobfuscated xworm
Rule name:win_xworm_w0
Author:jeFF0Falltrades
Description:Detects win.xworm.
Rule name:XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:xworm_kingrat
Author:jeFF0Falltrades

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments