MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 60ca2d9fc5e1a088f6338456580085ccb67c660f9167ef48a8767adec10133df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 19
| SHA256 hash: | 60ca2d9fc5e1a088f6338456580085ccb67c660f9167ef48a8767adec10133df |
|---|---|
| SHA3-384 hash: | 5d18b5dc6b282c0c4009c448c9af236ea21ee6e652f63186745c4fad4098c785bc6579cb181e115373f3030ad85abfc4 |
| SHA1 hash: | 6cf37c87b94776b3c6171f10c43cff9c705e8514 |
| MD5 hash: | 95aab44ac3c6329a826cc7adfe87a916 |
| humanhash: | berlin-apart-west-green |
| File name: | REVISED PI.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'092'096 bytes |
| First seen: | 2025-08-14 11:06:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger) |
| ssdeep | 24576:Ytb20pkaCqT5TBWgNQ7aX4o1AAmyrAY6A:hVg5tQ7aIoxmsR5 |
| TLSH | T15D35BF2273DE8379C37351B37A197701AE7B7C2506A6F85F2FD9093CAA60121921E763 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | a065646aeec646ec (21 x AgentTesla, 13 x Formbook, 5 x DarkCloud) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | agentesla |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked agenttesla malware samples. |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.