MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c8cbe9f0b916fd3553eac89cb1cf78e0f76900a40f349a86f9d17e5e048a26a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 21 File information Comments

SHA256 hash: 5c8cbe9f0b916fd3553eac89cb1cf78e0f76900a40f349a86f9d17e5e048a26a
SHA3-384 hash: 7dfef23e0d7490a492f825d6240eb3a490b2c89297ac5ecdeabe54eb0b9169ae3331a232aca04d0fcb43d3955ed3ba24
SHA1 hash: 0b72e0afc9efadad1a5b36b9084d87e81d4dbe33
MD5 hash: e477fb61dafe5e7a199e856bfaa8aebe
humanhash: sweet-timing-pluto-hydrogen
File name:Invoice#250812002_Update.pdf.js
Download: download sample
Signature AgentTesla
File size:438'483 bytes
First seen:2025-12-07 12:56:47 UTC
Last seen:2025-12-07 13:01:58 UTC
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 6144:zRTFKj8OtDZTisZddEK1ZJuUaZsmWio/OzXIXs24RE4:+IOxtEK1ZJuUaZ1WiGxME4
TLSH T1DC947F8063D1BC1813876FB6F72FB2D5E9AA8D987459080BDA04BCC0A1B5B1FE5E1D35
Magika javascript
Reporter cocaman
Tags:AgentTesla js payment

Intelligence


File Origin
# of uploads :
4
# of downloads :
113
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.2%
Tags:
virus shell hype
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade obfuscated opendir repaired
Verdict:
Malicious
File Type:
js
First seen:
2025-11-30T20:52:00Z UTC
Last seen:
2025-12-09T11:10:00Z UTC
Hits:
~10000
Detections:
HEUR:Trojan-Downloader.Script.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Multi AV Scanner detection for submitted file
Potential obfuscated javascript found
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
Gathering data
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-01 04:03:47 UTC
File Type:
Text (JavaScript)
AV detection:
10 of 36 (27.78%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Command and Scripting Interpreter: JavaScript
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTeslaV2
Author:ditekshen
Description:AgenetTesla Type 2 Keylogger payload
Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:MALWARE_Win_AgentTeslaV2
Author:ditekSHen
Description:AgenetTesla Type 2 Keylogger payload
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_obfuscated_JS_obfuscatorio
Author:@imp0rtp3
Description:Detect JS obfuscation done by the js obfuscator (often malicious)
Reference:https://obfuscator.io
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Generic_Threat_808f680e
Author:Elastic Security
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Java Script (JS) js 5c8cbe9f0b916fd3553eac89cb1cf78e0f76900a40f349a86f9d17e5e048a26a

(this sample)

Comments