MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77391131a0a0da51d57513444b2c635746df2e28bbe6c64991041427c856772e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 77391131a0a0da51d57513444b2c635746df2e28bbe6c64991041427c856772e
SHA3-384 hash: 3f56e71066e652b8dbd7ad139d4d15ec1cd24209283165bb23d5893deaf88a95ea759c8b582e65ad1c27e9c8321a721f
SHA1 hash: 20d800f25e2f62c83735a980f5549d56f8498acb
MD5 hash: c6579436299cd3811173374f5799a1a6
humanhash: uncle-one-fourteen-idaho
File name:nCopiaDelPagamento14042026.tar
Download: download sample
Signature AgentTesla
File size:655'360 bytes
First seen:2026-04-14 09:00:17 UTC
Last seen:Never
File type: tar
MIME type:application/x-tar
ssdeep 12288:eX4jwQ0CnmQC9Qf4Ct8v5kFoTNdvR0t1DVP8EAl4soOBRvAnBs97gTd2h5YwvDls:g4jwQPR2kSvtZstN2NBRvZ
TLSH T142D423017924C453F3322AF1DC6A8F726AE87C64F6518A5F2BC03E4F7DA7951780EA91
TrID 62.9% (.TAR/GTAR) TAR - Tape ARchive (GNU) (17/3)
37.0% (.TAR) TAR - Tape ARchive (file) (10/3)
Magika tar
Reporter FXOLabs
Tags:46-183-222-116 AgentTesla ftp-holzbrenzii-com Spam-ITA tar

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
BR BR
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:CopiaDelPagamento14042026.exe
File size:651'660 bytes
SHA256 hash: c8e7131b8bbbfa3693d17161e00b5d4a0ad9091ffbc1b9917f4d239ba7f314ac
MD5 hash: ae93864982dad21c5bfc381fdac03d96
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.9%
Tags:
injection obfusc blic
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug fingerprint installer installer installer-heuristic microsoft_visual_cc nsis soft-404 unsafe
Verdict:
Malicious
File Type:
tar
First seen:
2026-04-14T05:50:00Z UTC
Last seen:
2026-04-16T06:39:00Z UTC
Hits:
~100
Gathering data
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-04-14 09:01:17 UTC
File Type:
Binary (Archive)
Extracted files:
9
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:agenttesla family:guloader discovery downloader keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Family: AgentTesla
Family: Guloader,Cloudeye
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

tar 77391131a0a0da51d57513444b2c635746df2e28bbe6c64991041427c856772e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments