MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8573f0b0ca38799192fa3c6d6bfc928a2f1383f529e65c43f8c324b825735bd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | 8573f0b0ca38799192fa3c6d6bfc928a2f1383f529e65c43f8c324b825735bd5 |
|---|---|
| SHA3-384 hash: | 1232c2468c0ba4af8eebaa4aa0e31a75d86ecc68c926538e4fe8b7d1132e72bd3fafef42be21c76e620a41a3736298a3 |
| SHA1 hash: | d40983ac826c440521f4ccb1031d8433467d3ed8 |
| MD5 hash: | 36afc6ff15afc58ff708d529475594f5 |
| humanhash: | paris-queen-nevada-magazine |
| File name: | SecuriteInfo.com.Trojan.PWS.Stealer.37323.16857.26464 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 742'912 bytes |
| First seen: | 2023-07-24 14:29:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 12288:wovJRBusyi0/3AS5Xf8FnDeqiIf1E0ch/88ao:xFuJ/35Xf8tDniIf1da |
| TLSH | T1C2F4226533A9AE13D19CBDB84FA4A461037262606433D3CDDDBB20895ED17C0BF926DB |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | d455a86d496832b0 (15 x AgentTesla, 10 x Formbook, 8 x Loki) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ec2832608abf213a2a622dba1ec894e80b2adfc3d0eb03ee783fa2df47dc6bf0
fb2945c4344dbf6a9de214dcb4fcc52ab7b039b17b2ab924558eb08f8fd13c71
05220984bed944b5743d4a9b640a42788d53ef523a8f9dc81c983b9da74eb6da
8573f0b0ca38799192fa3c6d6bfc928a2f1383f529e65c43f8c324b825735bd5
fe0dc5415b9e4a0aaab85349ca18704f10b02a3f5fe6de959b3e39d12a9a07a2
d6497995d3f65551d193a651e10534d71d249b8e722290bc3c1f0fd4f7156c72
74184f7d76c799408c51a411c56eaaeab7adbf28a16cc3729bb0e96f11b55488
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.