MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 19


Intelligence 19 IOCs YARA 9 File information Comments

SHA256 hash: 227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225
SHA3-384 hash: c07908155bdd775d05f5d3ee610cd9bffa1776ab3f87898b9dc0f7714cdd9468e875f166a5950f252a136664c9cbe6ec
SHA1 hash: d98355c477c555f9c9df420158fabfa79135038a
MD5 hash: fa19b78b109a6e4775f8415de3812559
humanhash: undress-carolina-bulldog-zebra
File name:227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225
Download: download sample
Signature AgentTesla
File size:699'904 bytes
First seen:2025-12-08 16:09:49 UTC
Last seen:2026-01-09 15:22:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 21371b611d91188d602926b15db6bd48 (77 x Formbook, 64 x AgentTesla, 32 x SnakeKeylogger)
ssdeep 12288:Dz7hU5I5yuNHIgzSFKxWltRohBfSTso93Uke8v/LHR5VTmXJVYNrdEQEKS:Df+iN57Gtene3/Lj1iXAEKS
Threatray 1'151 similar samples on MalwareBazaar
TLSH T1F2E4239156C16950D1607330C83ACCA45A387D729E56677ECB28F69FAC703C3AEB364E
TrID 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.9% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon aae2f3e38383b629 (2'645 x Formbook, 1'203 x CredentialFlusher, 914 x AgentTesla)
Reporter adrian__luca
Tags:AgentTesla exe UPX
File size (compressed) :699'904 bytes
File size (de-compressed) :1'206'784 bytes
Format:win32/pe
Unpacked file: c51687fb524469a5e1cc2a67c2e43691decf8a844cc7827cfdf276da1f00f153

Intelligence


File Origin
# of uploads :
2
# of downloads :
137
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
AutoIt PEPacker
Details
AutoIt
extracted scripts and files
PEPacker
a UPX version number and an unpacked binary
Malware family:
agenttesla
ID:
1
File name:
227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225
Verdict:
Malicious activity
Analysis date:
2025-12-09 06:48:10 UTC
Tags:
stealer ultravnc rmm-tool agenttesla netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus lien
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Restart of the analyzed sample
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a service
Changing a file
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-27T22:26:00Z UTC
Last seen:
2025-12-10T12:11:00Z UTC
Hits:
~1000
Verdict:
Malware
YARA:
5 match(es)
Tags:
AutoIt Decompiled Executable PE (Portable Executable) PE File Layout Suspect Win 32 Exe x86
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-11-28 04:02:55 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
UPX packed file
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
c51687fb524469a5e1cc2a67c2e43691decf8a844cc7827cfdf276da1f00f153
MD5 hash:
4249b26282216381d5199522962a3e7b
SHA1 hash:
0adc40fcb0c95406c140b45c26a977cb95a3ec09
Detections:
AutoIT_Compiled
SH256 hash:
b9cdf033d2f2a7e386eb33c1d5fadc9c8d282dac63e1ce7ee8f0af49df84d711
MD5 hash:
75fc4d819504b797d12b74f98c8124c2
SHA1 hash:
b928fe89c209c05c3c5ec95d57664e4889dc61e8
Detections:
win_samsam_auto SUSP_OBF_NET_Reactor_Native_Stub_Jan24 MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine
SH256 hash:
a7c1da5486e91e8afd62833ab47c4c4d5d8097838353744433fe408144a5ad6b
MD5 hash:
f712b2c1865a3a118152452840a1ea11
SHA1 hash:
24cde43e6cd6bda14ca989d191c7c445993ab5a3
Detections:
AgentTesla SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021 Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
86cb879164afb94ebf9be082856c06291258f99c5941794d7a2461f285eade26
MD5 hash:
923eb89ae76de1ec653b7d74ac98e347
SHA1 hash:
6146f37e8592ce96854c831995628e35f43cc5a6
Detections:
AgentTesla SUSP_OBF_NET_Reactor_Indicators_Jan24 Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225
MD5 hash:
fa19b78b109a6e4775f8415de3812559
SHA1 hash:
d98355c477c555f9c9df420158fabfa79135038a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:win_samsam_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

AgentTesla

Executable exe 227a4456fb01401663152a26fe350696552d9e8b6800b0ae740f651537f51225

(this sample)

Comments