MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5ef2622fd50d4bfa7cd455dc45897770539baa8d8fca1f7cd41a40509375bf6a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5ef2622fd50d4bfa7cd455dc45897770539baa8d8fca1f7cd41a40509375bf6a
SHA3-384 hash: 56b2bdfc426740942b735c503be0a569ece947bcf3085672235ec7794776befd18adfeb11b2dd7819876099de9085bbc
SHA1 hash: 62378a51e0b2050e5a2d228e3494013a9a3a60e3
MD5 hash: 7d5106ec1d669415f57a6603b533f8f2
humanhash: mexico-vegan-sixteen-victor
File name:STAR APHRODITE.JS
Download: download sample
Signature AgentTesla
File size:4'017'577 bytes
First seen:2026-05-04 08:57:02 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:G7EMGCZJl9BC3olYJZnAcBJZ5Q39reVk8hvANtYElvRbutsOYMoqnpw0QWQw+pKD:Uv9BC3olYJZnAcBJZ5Q39reVk8hvANts
TLSH T142064AB65AD7E1237365DFC98639DD70CC0E44432849CF14709EEA3D781DE8AA226B63
Magika javascript
Reporter jahlives
Tags:AgentTesla exe-in-archive js spamtrap

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug base64 dropper evasive formbook obfuscated obfuscated overlay packed remcos repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-05-04T01:44:00Z UTC
Last seen:
2026-05-06T07:27:00Z UTC
Hits:
~1000
Detections:
Trojan-Downloader.JS.Cryptoload.sb HEUR:Trojan.Script.Generic HEUR:Trojan-Dropper.Script.Generic HEUR:Trojan-Downloader.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Base64 Block Base64 Payload Contains Base64 Block Executable PE (Portable Executable) PE File Layout
Threat name:
Script-JS.Trojan.Qwexlafiba
Status:
Malicious
First seen:
2026-05-04 07:02:12 UTC
File Type:
Binary
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:agenttesla family:donutloader execution keylogger loader spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Detects DonutLoader
Family: AgentTesla
Family: DonutLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments