MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8ccea9d264f5584180de3b726b676590bfec351367d48a03decb1ee37f9f3965. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 10
| SHA256 hash: | 8ccea9d264f5584180de3b726b676590bfec351367d48a03decb1ee37f9f3965 |
|---|---|
| SHA3-384 hash: | 6d21296949f39db4b57fe05a63c227bbd14f9dd37316675d65a43ade4df5cbe54f8d294d080499aa604c84a5f62f0ee0 |
| SHA1 hash: | fc69aca28634c9164977e952914999a6a6b25d29 |
| MD5 hash: | 57f8debd143953234b9a9df6d66cd5bb |
| humanhash: | pluto-video-freddie-glucose |
| File name: | 57f8debd143953234b9a9df6d66cd5bb |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 902'656 bytes |
| First seen: | 2022-10-17 15:58:06 UTC |
| Last seen: | 2022-10-17 18:30:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:TQ5kEsSyOUpM9oLQJPQXUhreWKptbWbYnzVDKqw9xs/:ThEDycaCYk5eWKp9W8rw |
| Threatray | 20'737 similar samples on MalwareBazaar |
| TLSH | T1031559B611965507E01A75758883D2F32AFB5D60B061D1C39AE72F2FBC713BBA11338A |
| TrID | 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.4% (.EXE) Win64 Executable (generic) (10523/12/4) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.4% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | f72e98b1b9dccecf (17 x AgentTesla, 16 x SnakeKeylogger, 3 x Formbook) |
| Reporter | |
| Tags: | 32 AgentTesla exe |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
824beccd394f8353802f6cb9c85da718fed66254e1ea95e8d34fef5a413242f6
ead17f7cb34256e3d832042ddffdf17b87d7ea150fbd11cfbc8defbb3a86f67f
d5c2951b5fada26015c7b4520529d7c24f285aaccdae3768956513c86cf4195d
5419b072a9edf702026def4104a16a22fc7ac5ad7a846d06d3c16e93d8aab540
7635639996bf57de5c0a337f05cdf48eec4345476b1acdd5db84c2f1967803b0
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_AgentTeslaV3 |
|---|---|
| Author: | ditekSHen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://104.168.46.107/55/vbc.exe