MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 92577c8e971b84aa753861bf7af9b4c1c986bcb1a4ccb40663398a1cf0fa99c2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 17
| SHA256 hash: | 92577c8e971b84aa753861bf7af9b4c1c986bcb1a4ccb40663398a1cf0fa99c2 |
|---|---|
| SHA3-384 hash: | e30e65926c675de67977de1fd5c70a5915c774be9fde2e15d55e7ba4575eb52228883922e62d06e96882ffff773716a0 |
| SHA1 hash: | cf989988649e052600ad6ca12714bea6b55afdd4 |
| MD5 hash: | a6b8865e1b91f4156be044271c0deade |
| humanhash: | muppet-ink-neptune-nitrogen |
| File name: | INV 2146217615 ref00D0NiQj05006M2RcSm9ref.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 705'536 bytes |
| First seen: | 2024-02-22 14:38:13 UTC |
| Last seen: | 2024-03-07 13:50:41 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:3ws/7P5Ujd53LlvUBSKG16sooANWZNRBabdyIpY2IqogO0kl/ABBJq2QKHIYUClX:tBKYS16EI6BK0Vqogk9AfJddjqPih+vq |
| Threatray | 408 similar samples on MalwareBazaar |
| TLSH | T10FE42309A3A89F26E63E4FF6781222111BB4B19A1E73F35D2EC520E77577B05C961E03 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.