MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60ef1afae839bd774d59f78c2866dad57a397db6f1c3a8432d3daa39985e040c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 60ef1afae839bd774d59f78c2866dad57a397db6f1c3a8432d3daa39985e040c
SHA3-384 hash: 7d45f565ee0bd95d4073e11446a1a5b69287f149aff056cf23d19465852c3bab6947ff053aa31d6757e6cccc6ce09fc6
SHA1 hash: 4b447b4b184ca4b04fb2884b30daacde1dcb5751
MD5 hash: 530305014893a26662328267cb3dab1a
humanhash: lactose-cup-fruit-fourteen
File name:60ef1afae839bd774d59f78c2866dad57a397db6f1c3a8432d3daa39985e040c
Download: download sample
Signature AgentTesla
File size:938'504 bytes
First seen:2026-02-05 15:24:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'795 x AgentTesla, 19'693 x Formbook, 12'274 x SnakeKeylogger)
ssdeep 24576:7uVeQ0FO9UHJdwqZywMCDd1+eNxpHZh4BCH/yO:79BvZ9pD2eNPj4BCHaO
Threatray 3'617 similar samples on MalwareBazaar
TLSH T1CC15128426ADD712C5D51FF00A61E7B217B09EAEF520C3568FFEBCEB3060B652944693
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
3d892df6f2a40d7f32e87096a22ab270660d9a340b1f549e6effbc52e0fde11e.zip
Verdict:
Malicious activity
Analysis date:
2026-01-21 08:39:09 UTC
Tags:
arch-exec auto-startup stealer ultravnc rmm-tool susp-lnk agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
asyncrat autorun lien
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-21T03:40:00Z UTC
Last seen:
2026-02-07T06:08:00Z UTC
Hits:
~1000
Gathering data
Threat name:
ByteCode-MSIL.Spyware.AsyncRAT
Status:
Malicious
First seen:
2026-01-21 07:59:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
19 of 24 (79.17%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Drops startup file
Reads WinSCP keys stored on the system
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
60ef1afae839bd774d59f78c2866dad57a397db6f1c3a8432d3daa39985e040c
MD5 hash:
530305014893a26662328267cb3dab1a
SHA1 hash:
4b447b4b184ca4b04fb2884b30daacde1dcb5751
SH256 hash:
6111bd3faadc16f2f39d8cdc6c8742e1dabc4c899ce15c5780ff52f862071f5c
MD5 hash:
9021e660a5f356b96fc7410bc133ce77
SHA1 hash:
9c2b5ab169a3ca17fe63e0f34aa13f091b4ba12c
Detections:
win_agent_tesla_g2 AgentTesla Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
c74f317ba34a4c982bcca64c87f8b9db08a01ddfb08dbf29118fc9e0d00914c8
MD5 hash:
3e92862dfe354760edb0fdc9ef86816a
SHA1 hash:
b6917fec34ee47628bfa2cff0b76aee501b00633
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments