MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 90457bb78ba96cefe86336dc292d5cceccf140ad44c680a01cdbd9e95d5ba93a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 14
| SHA256 hash: | 90457bb78ba96cefe86336dc292d5cceccf140ad44c680a01cdbd9e95d5ba93a |
|---|---|
| SHA3-384 hash: | 748cc9a3bd8c54dcc5b3d2900a3d7f055ee1fb05dcebd6d25cfb3cbdac16e5e51fc1db1ebd5d90fba4f604202d86c9c1 |
| SHA1 hash: | 663a348a85e6099093d851e0ee017eff8316ab64 |
| MD5 hash: | fa83becb63b85d7d54e506857cae8017 |
| humanhash: | red-winter-king-illinois |
| File name: | 22001625_REV001.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 680'977 bytes |
| First seen: | 2023-08-08 16:09:53 UTC |
| Last seen: | 2023-08-14 08:01:58 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader) |
| ssdeep | 12288:ZYD4tQxLiP8CT6pSxzGLdYsp/HHFzfW0ft1oJ5P4TvqQY5wCTk83iBh1Lpr1u:ZYD4tQxoC8xGJV/HlzD4R4z25wWW1VM |
| Threatray | 2'442 similar samples on MalwareBazaar |
| TLSH | T1E8E4230897A0845BEEB33E365A3C9CB66A5C701700F4C55F37E89D88F96A641A13D7F2 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ba698cd54cd138ebd1df234e780463070b9e108e980512fb33a857af1c3c6248
3a04516d71e6a24f0f20da46230239ca177e6c1d76cb887948344694e2a376a4
5244fa4cd53ba538933055ee4b4bec7f9579905c61868aac1bead60f773c3108
90457bb78ba96cefe86336dc292d5cceccf140ad44c680a01cdbd9e95d5ba93a
111955a5d7cb6b3059b043fd5cfd02827e0be24723c08133890836fc7b5c6121
163fdfd91953364306bcf8c6d69cada7306f0452fe3373e3247b5641123a0251
a0b6b9a0c87f57a88be1c4d631fb3d4f181eb545e7266d5c7463ff169f4b358b
40c36e5d6cec1bac32779ed8e2e2dceceae01a70115a23d3b3d32e9c56db86b3
e1fae54e9fb4d1c3d42119a980b7992cbadfda5c7051de61a2d1cef9d251c173
6f4954a23f51c48f450992f809848da3a8bb5c1d7c4bc262332fa2507f1a1cc9
f14adf8284d2d04072445b5744da50141332a86ec1f28fd7ca6e316b1a7e0b24
1520e3aac22234e1618a340dd4fd8015b661e07f43376291f86f4e59fe00a86a
b72cb2e4f13faeab3a9301367bfef0329f84700344f0ea29836f248004a11d70
51facce8035a547ae04ce3a005709418d6460bc49ca5dda71e8f32cc5ca2e137
17a097e7721e0542fb64dc7dd250c63b5ad3ed0a9ca2e23cb6df95e5a26f528d
9f3154e4f37ebd257119f4ae53522594b9d9f8cea1688472dd60fd14a4016fe6
24fca3cd8aad055b2284fdf5c0cd73642b88bb19de7c3137361e46529da5b67f
8a2edeef9978d454882bfb233d9cd77505618b854f7899b27aeb095ff8ebb3f4
cc7cb2ebb12103aea621ec7962819aced4680b4322bc213a9257b36c8f2dab3e
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c
22f34cc0b56ea1709b3af15b41b43fc40fca2b77debb8400108d3f517ee2ed4a
607e8a91c76f444784c2cbc1090cf8724d882d9861641a1f6e0de6b2b9401859
2de4a8c16d3643a3c58c63f4e7df2836919316635c05718dac1e474b6eb7fe29
ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2
c1955052a26634f3571423dc64d3fd10c55fdb27f29eb3afd292787693ffcf91
4d4f7a1cb34d5309e1c82e7110209c974a08b3e82eaaf7799d7d9a3a176132ca
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92
6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8
7e18e5fe9e980c48ad67cc2ce7423e818e15c1256e2ffe4ce85c5cfbd5b30877
5dbc3e721cd340dd80bfa7d0127d920f5f2630aa4b3b3ecfb8d2af9f28f0e208
4fe8bbc88d7a8cc0eec24bd74951f1f00b5127e3899ae53de8dabd6ff417e6db
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea
1ffa8b06cb779360f8c42ccd4527ae3076d25d11b3a90976f04ea430173e9b85
e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe
b69687c4b9aa0c1599840ea90562d3833367e8095addfc725fc2b52fad6ee565
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.