MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 17


Intelligence 17 IOCs YARA 24 File information Comments

SHA256 hash: 95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf
SHA3-384 hash: c48c6ba675984134dd2d0d5ceabd30d23e51274c170407fd59b5cb9a480edfa4d6e234ee9711c53c0da3fcda5de45d20
SHA1 hash: 4992a59831848ae90b60854044b5d3ca2f8e7f0b
MD5 hash: 3b84e578734ef189b8cb27cc6fdd09bd
humanhash: harry-queen-georgia-bulldog
File name:95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf
Download: download sample
Signature AgentTesla
File size:1'042'944 bytes
First seen:2025-08-12 14:19:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger)
ssdeep 24576:jtb20pkaCqT5TBWgNQ7a3CmV0TWb+j6A:gVg5tQ7a3FVMWb45
Threatray 3'268 similar samples on MalwareBazaar
TLSH T16325BF1373DDC365C3B25273BA65B701AEBF782506A5F96B2FD4093DE820122521EA73
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
39
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf.exe
Verdict:
Malicious activity
Analysis date:
2025-08-12 15:38:42 UTC
Tags:
autoit agenttesla stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Connection attempt
Sending an HTTP GET request
Reading critical registry keys
Launching a service
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug autoit compiled-script fingerprint fingerprint keylogger lolbin microsoft_visual_cc netsh packed threat
Gathering data
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-07-23 13:50:15 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Looks up external IP address via web service
AgentTesla
Agenttesla family
Verdict:
Malicious
Tags:
External_IP_Lookup
YARA:
n/a
Unpacked files
SH256 hash:
6e2d33ad47fe4343882ec998070abeb4262cdc54dce8b240d2483949981f7f41
MD5 hash:
3ec655b176ae7e0b0134692effb72d65
SHA1 hash:
d9e1c39be5a3c9545258343c46bfc7d96ffd5d20
Detections:
win_agent_tesla_g2 AgentTesla Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Parent samples :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 hash:
95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf
MD5 hash:
3b84e578734ef189b8cb27cc6fdd09bd
SHA1 hash:
4992a59831848ae90b60854044b5d3ca2f8e7f0b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:agentesla
Author:Michelle Khalil
Description:This rule detects unpacked agenttesla malware samples.
Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments