MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6c09b777df1a95bac8b74f67909ea7a24dd048d58847003546ccef328f72aff6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 19
| SHA256 hash: | 6c09b777df1a95bac8b74f67909ea7a24dd048d58847003546ccef328f72aff6 |
|---|---|
| SHA3-384 hash: | ca5d1ff8f32cf34d7a29368d447b8585addc2a66ca5dc5df3e350011b5ac0d374592539fbb2c5fe8f0257b9579d97849 |
| SHA1 hash: | 7ab7cfbc34c8730368d173b6da887efc1dedbd64 |
| MD5 hash: | 582a18d09290ca01a3e75841590bb9d1 |
| humanhash: | freddie-helium-wyoming-whiskey |
| File name: | New PO.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 731'136 bytes |
| First seen: | 2025-11-10 09:38:35 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:UC57eRPAIbMTEM8xLyBEHom4gQOaK+1Fz4JXjLuSaAMcwOLsMBf/VmzPJCKqp:v1+iTMyUom4jODbMc8oK |
| Threatray | 376 similar samples on MalwareBazaar |
| TLSH | T1CBF4F18C7654B5AFC453CA728AA4DC74A6607CBB930BC20391EB5C9FB91C697CE045E3 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.