MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 28208e1b641b60fee3605621354ac86e3fb129a03e391a72c657cc3282287794. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 28208e1b641b60fee3605621354ac86e3fb129a03e391a72c657cc3282287794 |
|---|---|
| SHA3-384 hash: | 8ca15eb35d4aa7d24b17cb651959ea509277835bf3746daf140a1f9364b4a4d78119c8660c8e8c68e7b7878965a9e2c8 |
| SHA1 hash: | 3d92e39393a51bf55d9ae4e0e6552382da1d62c4 |
| MD5 hash: | 0982451384d9b6c06aa661737303a9a8 |
| humanhash: | london-crazy-item-chicken |
| File name: | PURCHASE ORDER.pdf.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 886'784 bytes |
| First seen: | 2025-09-15 06:57:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 24576:rupDhC7j1kJgQpGld1O8vDrMMEzQZgmczIWwHuQJ:oradscgzxtzI7 |
| TLSH | T1AE151264134ADA02E5665FBA0971D3B40B786F9DF961D21B9FD23EDF7A32B804990303 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
05312d53d7f0968141efdd6ac8af8d39e4b52b724d372eff324cf93f549d536c
e91e804d32576f97f54cda9dd4134e8cf630fb527a14213e1974ddb15fa1473d
3309a024a0201382d31e4e0f37159a30b717f06f3641b9fe51a5a5d61eee0808
6f9e7f2f753573b0f2686c72dfb4bd2c174cb5ae9e435f36bb9f4b87145df44a
cbf1ad5e6e1957e0015cec2ed9689a271df61b00e00e44684add564482531e73
373e2de5a86643443e0a31987c68a69a9c0c816b08becedc61d8a1a3aa6902c2
5885dbee75437bb8e608840aa4cebc3c81652b4998babf704ac5890718186d1e
4c9768aebe51831c5f0403e5b4757dede1c53b6395cea328920267b23eaa6280
5c790bab5210fff2bb8a07582bf833c4653795d1d54bcf2df99274e85dbd7e96
e5858931d0359e9ca3d4c877c84229dece01066ebfabc238093df4ce539dc873
d1e54c22764dbc9a243d2c71d2ba5984d2930a4f5964605dc62245c147263b3a
28208e1b641b60fee3605621354ac86e3fb129a03e391a72c657cc3282287794
3309a024a0201382d31e4e0f37159a30b717f06f3641b9fe51a5a5d61eee0808
6f9e7f2f753573b0f2686c72dfb4bd2c174cb5ae9e435f36bb9f4b87145df44a
cbf1ad5e6e1957e0015cec2ed9689a271df61b00e00e44684add564482531e73
373e2de5a86643443e0a31987c68a69a9c0c816b08becedc61d8a1a3aa6902c2
5885dbee75437bb8e608840aa4cebc3c81652b4998babf704ac5890718186d1e
4c9768aebe51831c5f0403e5b4757dede1c53b6395cea328920267b23eaa6280
5c790bab5210fff2bb8a07582bf833c4653795d1d54bcf2df99274e85dbd7e96
e5858931d0359e9ca3d4c877c84229dece01066ebfabc238093df4ce539dc873
d1e54c22764dbc9a243d2c71d2ba5984d2930a4f5964605dc62245c147263b3a
28208e1b641b60fee3605621354ac86e3fb129a03e391a72c657cc3282287794
3309a024a0201382d31e4e0f37159a30b717f06f3641b9fe51a5a5d61eee0808
6f9e7f2f753573b0f2686c72dfb4bd2c174cb5ae9e435f36bb9f4b87145df44a
cbf1ad5e6e1957e0015cec2ed9689a271df61b00e00e44684add564482531e73
373e2de5a86643443e0a31987c68a69a9c0c816b08becedc61d8a1a3aa6902c2
5885dbee75437bb8e608840aa4cebc3c81652b4998babf704ac5890718186d1e
4c9768aebe51831c5f0403e5b4757dede1c53b6395cea328920267b23eaa6280
5c790bab5210fff2bb8a07582bf833c4653795d1d54bcf2df99274e85dbd7e96
e5858931d0359e9ca3d4c877c84229dece01066ebfabc238093df4ce539dc873
d1e54c22764dbc9a243d2c71d2ba5984d2930a4f5964605dc62245c147263b3a
28208e1b641b60fee3605621354ac86e3fb129a03e391a72c657cc3282287794
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.