MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77352a0a3ccbba6dcdafc60a48d7269f7625c1414a5c35d2d192fffd4893202c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 77352a0a3ccbba6dcdafc60a48d7269f7625c1414a5c35d2d192fffd4893202c
SHA3-384 hash: 8fe3806190c67c91172e08a1eb1d7475b5a2fe53d93f688be7d3fdb67e28a09536485a6df7dac0110b6b4db943af03c4
SHA1 hash: b27eddafa1d7c596afe9a4bca50f30b88b0a34b0
MD5 hash: 740870f89c961c0b6ce6cc292909a2a9
humanhash: fanta-mexico-carpet-music
File name:AIRFF.ps1
Download: download sample
Signature AgentTesla
File size:1'198'829 bytes
First seen:2026-02-05 08:31:02 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 24576:FYWFxmJpVHIyD9H1WLDYYOcotfG2AGWKsYipzA9rafBN9RU:FUTZG/Aj
Threatray 1'277 similar samples on MalwareBazaar
TLSH T1EF451210CA69CD6A015C526020991EC69A914E770D18BBBA3F9F1E8E4F1F28FD0757FE
Magika powershell
Reporter JAMESWT_WT
Tags:45-153-34-90 AgentTesla ps1 sales-thesignscentre-com

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
70%
Tags:
ransomware spawn virus lien
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 powershell
Verdict:
Malicious
File Type:
ps1
First seen:
2026-02-02T02:34:00Z UTC
Last seen:
2026-02-05T06:02:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.InjectorNetT.s Trojan.PowerShell.Agent.azq PDM:Trojan.Win32.Generic HEUR:Trojan-Spy.MSIL.Agent.sb Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Disco.sb Trojan-PSW.MSIL.Agensla.sb
Gathering data
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
AgentTesla
Agenttesla family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments