MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b8ca853a36d772f8fc6aa0ae71ee1f780d772d19d2ef1a24752ceae14d0fc29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 8b8ca853a36d772f8fc6aa0ae71ee1f780d772d19d2ef1a24752ceae14d0fc29
SHA3-384 hash: 6324b03985ee8fe3df291fab8062ca82191acc23ef3815e861ba42373d9438cd93a185ce39cc67d9b40d1fcb5f5ffe8e
SHA1 hash: 6b0c7a06a74d96181f0495a9a6d61723ff3c4260
MD5 hash: a7d5969f45190415af9d25caf4f9b21c
humanhash: jig-apart-berlin-indigo
File name:SWIFT COPY.JS
Download: download sample
Signature AgentTesla
File size:3'374'184 bytes
First seen:2026-05-08 07:39:39 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:LytnJ6/W5N5q9UehgVOFw7ki0BzM6Pm+sZQM7fEULOP/wT5toSbg8pRr8aWGTj:Lytn15z8ZuVL7ksQgfxpbtRroGTj
TLSH T1FEF539415A3A5470A66DD72CD03A66540A5D200B15C8FF3D34B862BCF2A2F5B2B6F8F7
Magika javascript
Reporter JAMESWT_WT
Tags:AgentTesla js Spam-ITA

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug dropper evasive formbook horse obfuscated obfuscated packed repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-05-04T06:48:00Z UTC
Last seen:
2026-05-10T05:42:00Z UTC
Hits:
~10000
Detections:
PDM:Trojan.Win32.Generic HEUR:Trojan-Dropper.Script.Generic HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic Trojan-Spy.Stealer.FTP.C&C Trojan-PSW.Agensla.TCP.C&C Trojan-Downloader.JS.Cryptoload.sb
Gathering data
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2026-05-04 13:45:23 UTC
File Type:
Binary
AV detection:
10 of 36 (27.78%)
Threat level:
  5/5
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:agenttesla family:donutloader discovery execution keylogger loader spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Detects DonutLoader
Family: AgentTesla
Family: DonutLoader
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments