MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 49bc579c76fbe3797d8ef0defec51d64087fabc11dab7f537042164c45c33846. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 49bc579c76fbe3797d8ef0defec51d64087fabc11dab7f537042164c45c33846 |
|---|---|
| SHA3-384 hash: | b69255ffea1e5027f255e94db455aac04ba6393e17e84fd74943837dc15c32ece8c7e2a2298624873cafb9c406e7dea2 |
| SHA1 hash: | f0b641ab870129882954d837ac61c6480e8bc8ef |
| MD5 hash: | 99eb4bf2e02cfcd0a50760ab0d6089d4 |
| humanhash: | cold-november-may-mockingbird |
| File name: | swift copy.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 782'336 bytes |
| First seen: | 2023-06-16 13:43:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:m5o+pa26Y0Li2MT5ItXknk+AbRx4W67f/zLGBSAVnPEXqXdVu5:Ko+pSYa7Bynk+AHo/KhP4qXdVu5 |
| Threatray | 2'850 similar samples on MalwareBazaar |
| TLSH | T192F4020876DD9833C6FA0BF5D44111B193F3A06AB246E3C66D4F78E9A6D2F8C0D95683 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
f3272c1d83abe1c34e604d47d8e7994fc9b9d9914606fe0499fd2feef07cd1cb
49bc579c76fbe3797d8ef0defec51d64087fabc11dab7f537042164c45c33846
e6d85b943658d32b138279b866c581b76b7e1d3ecd55d51a71c1efa89e42c041
4414de6c77116fc0cfe575340768bac4af2829cafb1e0d0934739e9c5ea66c6a
69630d1a9a263eb01442eda82db24fba3b5570fe73fc43d0d8245e81b5b1b3b7
9059ad105bd54068b066f69fe3fc0cdacd0aeab946f78dcfb1d744ff1742fb2f
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.