MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2a8a729d0e203b203a53c0b4ab591ef3aa3eb0fd45972297a2b597404ecef986. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 2a8a729d0e203b203a53c0b4ab591ef3aa3eb0fd45972297a2b597404ecef986 |
|---|---|
| SHA3-384 hash: | a76b8f7dd281d32decd2dd4746ba0636439dbd1135f8ed84931c734d41e517c696394062175f3760ccf20413212732db |
| SHA1 hash: | bbf16a90b8ffa643f247430c9b202bd850567bf0 |
| MD5 hash: | 55334b1d1e0eb722eca1875247c9c06c |
| humanhash: | lion-alanine-sad-enemy |
| File name: | 2a8a729d0e203b203a53c0b4ab591ef3aa3eb0fd45972297a2b597404ecef986 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 676'352 bytes |
| First seen: | 2025-09-05 12:59:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:ULSCKnTKMl/DBM0xStBChg15UyDLszs1BXnFcBDX8fhSr6CuzZhan2:UvWTzthStY21WyAzInFgL8fw9 |
| Threatray | 4'126 similar samples on MalwareBazaar |
| TLSH | T1FBE4022521A9D015E1F92F342DB6D3B8977E3D8D6831C74B4BE86CAF7C36A00A4547B2 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
730932451281bdcb34fd32ac3aeaedef8f0a919492032944bffaa5852b85d4a4
b50abf45e0678c75cfc596847eae2d069926ea34c71302a6d2904cfd380669e8
66d9239944d23d3680e32ff7044a29b44ac945379cdca227ba5b51f75d252a53
bec40e9e4bc9018106ccb3da5ebc4714cac1f436e421714cc8d76470ffd6edd6
a91034a005a82a1ec69a6682de74809632207aa47acefe46bf44e98af51284b7
e4097233fec4adb5cb99489005e6beaf15b6f7e7c3040432b11b65e49a9cf55f
15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef
36870ed67d32b8398243d77c47975603750cc92e9821db555b8e2b2df4d3d3b6
6cfc601fa3fcc2f02606539608dd1f08bfccc8d0ccfc6f32d7bd5110dc0b6f5e
d5a0f85ffb3ee297f57ffb96a77288de2a564c5cb337b5c6c7b01da8e36545d6
f3c4c44285b5439a4c608e38beb95ada32d34f68b83ed9795649185754d9d5bd
76bd7d4ab00c260d021b928207d2617b19784eedfe615c1352419512e62fb8cf
75a62b6fff32b813131d55fde90e5eb52818c3b34304716404d23dab89a90b8d
2a005539d78a0c685832affb3bfbfba01de751fa8b6cdf02becddabfc89b9029
50f213324308d7628f1708c4cb7c6242bb15ed45f1828f459703bfd692d007a0
d22ba564b79465fff584d41655b8bd84e6bf0046b30d371cc2ccc5adc08e5a84
d0149e816937c3d187140af8bb91858c5afaca1320c98697a02e2bd890f098a1
eafb84b57cf63dca7bbd6db5f15a003bc2eb93680049b83b9fa4b03dce382224
2a8a729d0e203b203a53c0b4ab591ef3aa3eb0fd45972297a2b597404ecef986
3437dcba37836ce6f8964000868d8b0728e5dcb25d8bf7421828bd1ba5e6b506
2a8a729d0e203b203a53c0b4ab591ef3aa3eb0fd45972297a2b597404ecef986
168eb588a4e2f648bb92bec333cbd6a68e2de589a9d804f07933953a4ffc4d1b
62f63b180fc726bb6d54ecba4b3edb4436e2442953b07aea87c0e60cf057417f
eb2355578fd4ca8325b848618aa1e062b72e13aa38d4bd3fdd57beeac2dd34e2
1ec85fc809f0659a6b0d5ec96360eb167f377a2f36158b112d3417b8aa28c6d3
0003037c7818733557d04c87095ece05f43dce9f2b571d82ba633181956132a2
45c64c04137dbd68881ec07852bf10e7c491f504e1f78247b1217114cab47d3e
2b487f0335ba1979c655567bfeac93da05f0536374da8d625401f5ac5c33abb8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | agentesla |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked agenttesla malware samples. |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.