MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 99c6f209e4e4adf3502472112f7172ede1a5dbf829c59d593449605ca2698d49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 99c6f209e4e4adf3502472112f7172ede1a5dbf829c59d593449605ca2698d49
SHA3-384 hash: 362b6939a01731aaeb28846718a17a848e2ba3064917faebaa1c945eb199748d156abd3b91ee97a2b1ecd697aab9db84
SHA1 hash: 91166b7a660a54f63385eae811e93e28f66c0263
MD5 hash: f9d2151992f2dfced5669d243bcb13fb
humanhash: wyoming-summer-freddie-foxtrot
File name:ec.hta
Download: download sample
Signature AgentTesla
File size:43'532 bytes
First seen:2026-03-02 10:54:30 UTC
Last seen:2026-03-02 23:15:59 UTC
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 192:yXRucRuJXFXxCXRXTX+XtXsX/Ru9XUXQBYPeg1TUU:Au0u8utBieg1T/
Threatray 126 similar samples on MalwareBazaar
TLSH T12B13C738CB91CE484FBB55CE2C6E9961542F4AE75A27522CB1ED20D18B14FDE241BB83
Magika html
Reporter JAMESWT_WT
Tags:192-3-176-231 AgentTesla bot8747049877 hta Spam-ITA

Intelligence


File Origin
# of uploads :
3
# of downloads :
400
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.9%
Tags:
xtreme shell lien sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://192.3.176.231/22/9sd9fd0809g7sd8f789g73438g97dsf8g798s7df98g.js
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell powershell pterodo
Verdict:
Malicious
File Type:
html
Detections:
HEUR:Trojan.HTA.SAgent.gen HEUR:Trojan-Downloader.Script.Generic
Verdict:
Malware
YARA:
4 match(es)
Tags:
DeObfuscated Html PowerShell
Verdict:
Malicious
Threat:
Trojan-Downloader.Script.SAgent
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-03-02 10:55:30 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery execution keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Badlisted process makes network request
AgentTesla
Agenttesla family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8747049877:AAEWVgFONiQJBBqfuvj5ARpQ5i_l9-B3HNc/
Malware family:
AgentTesla
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AgentTesla

HTML Application (hta) hta 99c6f209e4e4adf3502472112f7172ede1a5dbf829c59d593449605ca2698d49

(this sample)

  
Delivery method
Distributed via web download

Comments