MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5937ec8f18e55b4cf85388c886992ecf7ada1a3a0ba17688e4fa6ecb2f9f81f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 20


Intelligence 20 IOCs YARA 4 File information Comments

SHA256 hash: 5937ec8f18e55b4cf85388c886992ecf7ada1a3a0ba17688e4fa6ecb2f9f81f6
SHA3-384 hash: edf70d4784ae5bd601c60ae1ac8af626a6bd4e97225cfe7897b0556bc5084a9e6a0fa6cedc65ae14ce4f54a9e1717e6d
SHA1 hash: 69ba154ca4068c6a16b6bf945c4630cc0145df6b
MD5 hash: d6d5b4677130676ec93938576a3600e5
humanhash: uniform-beryllium-steak-london
File name:KHN250045 Booking 1-case305kgs2.53cbm ETD.xls.exe
Download: download sample
Signature AgentTesla
File size:699'392 bytes
First seen:2025-10-28 07:14:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:q7gmq4dldiz5a3W5VI4lhylNaC3Plc/UeNRDtH:qkmbdiz5a3uVIghyZtc/Lx
Threatray 384 similar samples on MalwareBazaar
TLSH T117E412442BB1E403D8E6A3314DB1F3B84774BE9AE920C71BDED46DABB979A504D10723
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter lowmal3
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
KHN250045Booking1-case305kgs2.53cbmETD.xls.exe
Verdict:
Malicious activity
Analysis date:
2025-10-28 07:18:01 UTC
Tags:
stealer ultravnc rmm-tool exfiltration telegram agenttesla ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
underscore lien
Result
Verdict:
Malware
Maliciousness:

Behaviour
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a service
Changing a file
Creating a window
Unauthorized injection to a recently created process
Stealing user critical data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
masquerade packed vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-28T00:17:00Z UTC
Last seen:
2025-10-30T05:06:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Spy.MSIL.Agent.sb Trojan-PSW.MSIL.Agensla.d Trojan-PSW.Win32.Stealer.sb Trojan-PSW.TeleBot.HTTP.C&C PDM:Trojan.Win32.Generic HEUR:Trojan-PSW.MSIL.Agensla.a Trojan.MSIL.Taskun.sb Trojan-PSW.TeleBot.TCP.C&C Trojan-PSW.MSIL.Agensla.sb Trojan-PSW.Agensla.TCP.C&C Trojan.MSIL.Crypt.sb Trojan.MSIL.Inject.sb HEUR:Trojan.MSIL.Agent.gen Trojan-PSW.Win32.Disco.sb Trojan-PSW.MSIL.Agensla.g
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.18 Win 32 Exe x86
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-10-28 02:59:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
16 of 23 (69.57%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
5937ec8f18e55b4cf85388c886992ecf7ada1a3a0ba17688e4fa6ecb2f9f81f6
MD5 hash:
d6d5b4677130676ec93938576a3600e5
SHA1 hash:
69ba154ca4068c6a16b6bf945c4630cc0145df6b
SH256 hash:
b18669cb5364b48bc3eb32c6e81644f73fac363183de5fee42dd2b1b8077b09b
MD5 hash:
fe257e4f1da6fed1017108c08189924d
SHA1 hash:
6d72a292860ba31dbdfe633479d8a2d1624c9d73
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
9c7e263eb5e3aa7844d387e41b4cceab93506bbccbcf34b7b34b445e97afe5cf
MD5 hash:
c151009459e01a94b164adb922f93a08
SHA1 hash:
87f788b04a4557da5c6f3b54bb16d66ab6bdd14c
Detections:
win_samsam_auto SUSP_OBF_NET_Reactor_Native_Stub_Jan24 MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine
SH256 hash:
ea99aa8cb030e83a8ef7f719e2a2fb1e5183ae57b2f672b16952fb8a2d58b0d3
MD5 hash:
7cdfee44f6d1bfad978f4df17609a5fd
SHA1 hash:
aca3f8cee07af54068f2fa1f18a9be0036970d43
SH256 hash:
1fb71564a178a34283965986c17dba7840a7ea8fac67e361c0b64ac92f4e15a7
MD5 hash:
3bc78aa4d5c1d8f628a4d9fe806d7e06
SHA1 hash:
13597bc4bc2d18340da7d15483936d3a5884803c
Detections:
Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
6e75c167ce646f76c0b64feea5a3803732311479980bb731a27112a516adad01
MD5 hash:
a2e78e6414602370078ba63e71a1ce6c
SHA1 hash:
cac60a0f79ad496984334f9bd53d077d3a9a9b51
Detections:
RedLine_Campaign_June2021 Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 5937ec8f18e55b4cf85388c886992ecf7ada1a3a0ba17688e4fa6ecb2f9f81f6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments