MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 805963dc775b0107e60e83570e05ca7ef4f1c47b5537f850bd65819ff0d75667. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA 23 File information Comments

SHA256 hash: 805963dc775b0107e60e83570e05ca7ef4f1c47b5537f850bd65819ff0d75667
SHA3-384 hash: 2350f79e1ac1b31f96307eba61c1ee6d8ccff499e276e78b09a4b6f5d5a5779f3417fc81d313a35676f96eb1293b7ef1
SHA1 hash: 8f0e3072d89ef18ee6897b430e4b9827bc83bbe4
MD5 hash: a0dfa6fc78e98aa7dfc4a3260d980f79
humanhash: four-march-kentucky-spaghetti
File name:FreeTempSpoofer.rar
Download: download sample
Signature AgentTesla
File size:1'817'806 bytes
First seen:2025-10-17 12:57:36 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
Note:This file is a password protected archive. The password is: 123
ssdeep 49152:v88HAS7pn8CqZG0cFDELulBId9xpqVRdM:04Awh8CJplUS29sM
TLSH T171853374C634D012157A4E39672ED5260268FC7A04AF77D8F7209D3EBC94CD68AF4B8A
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter burger
Tags:DCRat pw-123 rar

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
NL NL
File Archive Information

This file archive contains 3 file(s), sorted by their relevance:

File name:dControl.rar
File size:455'514 bytes
SHA256 hash: 1c52dd820b66e3f5307b6b59ef0fcd46600d40cd7a3d86a8d181d59431d6c0ef
MD5 hash: d1371ea489a7276525b153c600edbc63
MIME type:application/x-rar
Signature AgentTesla
File name:blockdriv.rar
File size:427 bytes
SHA256 hash: d9e15fde6e53232440a87199d5cf3dbce1892f6bb8adf8468afeea27bff6cd1e
MD5 hash: 40901f10f77409cd454e4c2e4b545222
MIME type:application/x-rar
Signature AgentTesla
File name:RankupServiceFreeTempV5.exe
File size:2'032'576 bytes
SHA256 hash: e97d951d16cf830c8ac014afb27c6b09736527ef963c2eb973f95c2f4bbeadc4
MD5 hash: 62eec3fac213ab732e4756bb5c3eb9c6
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
applicunwnt injection extens
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Rar Archive
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-17 12:58:38 UTC
File Type:
Binary (Archive)
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Any_SU_Domain
Author:you
Description:Detect any reference to .su domains or subdomains
Rule name:Check_VBox_Guest_Additions
Rule name:Check_VmTools
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Enigma
Author:ditekSHen
Description:Detects executables packed with Enigma
Rule name:MALWARE_Win_DLAgent10
Author:ditekSHen
Description:Detects known downloader agent
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:win32_dotnet_form_obfuscate
Author:Reedus0
Description:Rule for detecting .NET form obfuscate malware
Rule name:win32_dotnet_loader
Author:Reedus0
Description:Rule for detecting .NET loader malware
Rule name:Windows_Generic_MalCert_65514fe0
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

AgentTesla

rar 805963dc775b0107e60e83570e05ca7ef4f1c47b5537f850bd65819ff0d75667

(this sample)

Comments