MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2ba754a0ac25585ea570c7a1676a840dfd34b3958e9b47b3b8f0504e0cf5ef57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 2ba754a0ac25585ea570c7a1676a840dfd34b3958e9b47b3b8f0504e0cf5ef57 |
|---|---|
| SHA3-384 hash: | 0864b3995f09aaf655373b275d5a8d37badcda60a8dff6ad6d0cb06a1c36d5183d032271cfc4fe1cb54d5712ebf34279 |
| SHA1 hash: | 97f4e16e91650030116596f3895c1afa524a7f26 |
| MD5 hash: | 2d7a561a5da8bc8a2be9e28a04060cb2 |
| humanhash: | winter-earth-autumn-blossom |
| File name: | Conveyor belt - drawings.pdf.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 832'512 bytes |
| First seen: | 2025-07-09 03:45:49 UTC |
| Last seen: | 2025-07-09 10:18:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:RKFAkO9AFtK1fZXB6D9lQ5cTrN/1fbMP6yCRFwmVS5R3Ay48QEJ4H444t:rkQCtKjBosgNfbM4/Ig8B4H444t |
| Threatray | 3'423 similar samples on MalwareBazaar |
| TLSH | T18C05D0626F00F432C811BFB55359E374D22B5E84A412DB865CF9BEA739E56C23F87182 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 36c29292b2e88c82 (54 x AgentTesla, 33 x RedLineStealer, 11 x Formbook) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.