MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5f47f9ec37932ce319cb40f451be31a9c62500dac31b79d16e5970d32612c094. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 20
| SHA256 hash: | 5f47f9ec37932ce319cb40f451be31a9c62500dac31b79d16e5970d32612c094 |
|---|---|
| SHA3-384 hash: | 06a595b0eff6786da18666c4fdf1c14b30dfa8936669bb5c9982fd278a25bf6f9885fe6a88d185dd60b22197dd7a3ecb |
| SHA1 hash: | 7e45fd1cc78ce76f28e51a0a2c2b57ac3a645a6b |
| MD5 hash: | 1e5d40dc6ca64254f1f04ba1ae8f6b1b |
| humanhash: | iowa-bakerloo-floor-white |
| File name: | 5f47f9ec37932ce319cb40f451be31a9c62500dac31b79d16e5970d32612c094 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 245'248 bytes |
| First seen: | 2026-03-06 13:54:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'843 x AgentTesla, 19'775 x Formbook, 12'297 x SnakeKeylogger) |
| ssdeep | 3072:kKxZ6iyqa9PRn6sO+4YUTHo9rG8KaG5jnTh9qcufzz:X6iyqahhX+sq8KaWTn |
| Threatray | 3'303 similar samples on MalwareBazaar |
| TLSH | T1C53400027F88EB15E1A97E3782EF2C2453B2B4C71633C60BAF49AF5514516826C7E72D |
| TrID | 70.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.2% (.EXE) Win64 Executable (generic) (6522/11/2) 4.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe ftp-corwineagles-com |
Intelligence
File Origin
ITVendor Threat Intelligence
Details
Result
Behaviour
Unpacked files
25f9e3f474b1a015cd410af97f32780ded388bb2cc4476c7f879f4d4309fa1ec
f5df30356e96faf9cd78beb315949553bc8956c13298a0633c821ff4fa4caa9e
15b1b34eaeee9443647ea07147e09b497c0d5082de8b0b5eca417909e27bb0a9
f763fbeb6f8ea2104445b74b4e8cc716432734540a8713f88e6b72355f1ea66f
99f9f9125484b63c3abd922c0cdbad4ee8b85366f5fcbc2b391379a2295a2701
30dcf5b00caa20bdcd20aaab0c3ed0bceca35d94a0b5791df113ea2cfeea4d0e
535ada9c0c833577ab9489386fad8fc02e9629fe8d038e3dedb3db261868e0ed
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV2 |
|---|---|
| Author: | ditekshen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AgentTeslaV2 |
|---|---|
| Author: | ditekSHen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Windows_Generic_Threat_779cf969 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.