MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 59221ef93ad609dfddc918d4612cd968975af52b8e851205ab2f76f23919fad1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 59221ef93ad609dfddc918d4612cd968975af52b8e851205ab2f76f23919fad1
SHA3-384 hash: 61972812642d37c99ca4accdf44c5e52f93f0d04ace580e289b6de6914b25308846cb3e67b4b5e8b23eb03356322d345
SHA1 hash: da7030b98b7a68b9f155aefdb43eea883ff9619c
MD5 hash: 4aaa6a23cc752a9a62411da8bdb54552
humanhash: oranges-ceiling-avocado-asparagus
File name:New_Order96342.iso
Download: download sample
Signature AgentTesla
File size:1'572'864 bytes
First seen:2026-04-13 23:22:15 UTC
Last seen:Never
File type: iso
MIME type:application/x-iso9660-image
ssdeep 24576:0T20JJN6kODLQuZD0hPEfWC6wYcPIEOBc8hjE:0T7J8lDLQuZD6c3PMc2
TLSH T15375235573D4D24EC0C00972CC25F6A236E66C2227550B2E37D8FE29EBB29D3AB475D8
TrID 47.7% (.ISO/UDF) UDF disc image (2114500/1/6)
46.2% (.NULL) null bytes (2048000/1)
5.7% (.HTP) HomeLab/BraiLab Tape image (256000/1)
0.1% (.ATN) Photoshop Action (5007/6/1)
0.0% (.ISO) ISO 9660 CD image (2545/36/1)
Magika iso
Reporter BastianHein
Tags:AgentTesla iso

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
CL CL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:NEW_ORDE.EXE
File size:1'003'944 bytes
SHA256 hash: 458006548ab9c613545ee5732262593ed09b01d3b9cff93dfe10ecb38923a469
MD5 hash: 2574f2dadb7dcf452bd5e22cc33886fd
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Malware configuration found for:
Archives GuLoader NSIS
Details
Archives
extracted archive contents
GuLoader
an XOR decryption key and an extracted component
NSIS
extracted archive contents
Verdict:
Malicious
Score:
96.5%
Tags:
shellcode virus nsis
Gathering data
Verdict:
Malicious
File Type:
iso
First seen:
2026-04-07T02:38:00Z UTC
Last seen:
2026-04-15T12:18:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Win32.Guloader.gen
Gathering data
Threat name:
Win32.Trojan.Suschil
Status:
Malicious
First seen:
2026-04-07 06:38:32 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Family: AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments