MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 35a6c90aeed158cbca180d1b3116e6d07cdfdc41731243f01896bec972b99255. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | 35a6c90aeed158cbca180d1b3116e6d07cdfdc41731243f01896bec972b99255 |
|---|---|
| SHA3-384 hash: | e53e3f50757ed61bfea58d60211e1633808f20dc46b5fd378f01720bcfbc10558fc6053d014f8da49e613ac553dd3e52 |
| SHA1 hash: | ec558f20b22dd594360fd2c31db187aa24968367 |
| MD5 hash: | 16a6a8fa735eaff4f3781c9025fc0289 |
| humanhash: | yankee-stream-vermont-william |
| File name: | PO55140067.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'023'488 bytes |
| First seen: | 2025-08-07 12:25:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:ReGCoULkDoMAzbXEMWbASvVrFkAb+CXMDgqwWE:RxCoCkDoMAPXNWbfLk++N8qQ |
| Threatray | 10 similar samples on MalwareBazaar |
| TLSH | T11725E01123B88939F5AF4BB96960C0300B72BC16A492D359E6C978DB3CB17D09DFA717 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | win_samsam_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.