MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8bfb1cfd0b05ffac2f9d4236c8decdc8681bce52b2839332aa1e38bcde43462f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 9
| SHA256 hash: | 8bfb1cfd0b05ffac2f9d4236c8decdc8681bce52b2839332aa1e38bcde43462f |
|---|---|
| SHA3-384 hash: | 408f52e479aee7a473f4761e31fa1525f760bbefd5c650d3786aae4b8c281403b74b8ae0a295e9c282fa723cdfb2a01f |
| SHA1 hash: | 3884ea86a5e084c7dc4e9beabcf50de0165164e9 |
| MD5 hash: | 43025fd695c379acd3efbe459a99e8c9 |
| humanhash: | social-stream-magazine-shade |
| File name: | Invoice No. 9296.ace |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'002'883 bytes |
| First seen: | 2026-03-31 06:48:27 UTC |
| Last seen: | Never |
| File type: | ace |
| MIME type: | application/x-ace-compressed |
| ssdeep | 24576:9IoGgrIMzLrxF4HtCKxSGh/hYGMqG99fYjxIOsa:95Bn3bYtCKxvMjH9qx |
| TLSH | T1EA253313D2FFB740EB5B6357396C3795A5AAE21DD0B8C9C1A33C9D895ECA901BC60D08 |
| Magika | ace |
| Reporter | |
| Tags: | ace AgentTesla |
Intelligence
File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DEVendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
81.4%
Tags:
virus
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Verdict:
Suspicious
Labled as:
Mal/DrodAce
Verdict:
Malicious
File Type:
ace
First seen:
2026-03-30T08:15:00Z UTC
Last seen:
2026-03-31T20:44:00Z UTC
Hits:
~10
Verdict:
Malicious
Threat:
Family.AGENTTESLA
Threat name:
Script-JS.Trojan.AgentTesla
Status:
Malicious
First seen:
2026-03-30 11:09:54 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
12 of 23 (52.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla defense_evasion discovery execution keylogger spyware stealer trojan
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8271047137:AAEexDI10mt9IUeumEpriGOSFf1ITlCIW-0/
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.