MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 28ecb6d1b09a39c5958fafc00f93c274e840832fe300643b38584f028582c49d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 28ecb6d1b09a39c5958fafc00f93c274e840832fe300643b38584f028582c49d |
|---|---|
| SHA3-384 hash: | bbce236ae12a59ea98c5d2c90789bab98d0335c2556b6a6036183c233167af6c7b1c1d671ee085b3124f9101d89e95cd |
| SHA1 hash: | 82b013d136d7c873508a5364709e5a2d3e379113 |
| MD5 hash: | ddfe91f7cdf26a72c2f0c92d69a8fb6c |
| humanhash: | lake-hotel-red-kitten |
| File name: | Shipment-55019318A.PDF.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 905'216 bytes |
| First seen: | 2023-11-17 07:15:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 12288:DOcGkuPUpETxWHP8FgESeie4NXT5GLz+l+8aY6nLSO8GtvFXsNPW:DJG3UpE9WHNeyXT5YSlz6nLSO8avh |
| TLSH | T16915282C21296F8DF7A492FCB2719CFF13A4682F50BBF5F7894CA0D746A97D05502622 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | AgentTesla exe payment |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.