MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a393af04b058f4fead2a0b08394407510445808c02ed8ae7f80c25b756137d78. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 18
| SHA256 hash: | a393af04b058f4fead2a0b08394407510445808c02ed8ae7f80c25b756137d78 |
|---|---|
| SHA3-384 hash: | 9aac7d402e8817f97856af0df738b61567411a702fe98ade5d257ca6e90059f58ba828ac4052f076a34d29b0515db449 |
| SHA1 hash: | 831406c99c7f0fc1f6f7521a35df90e2e8a4f435 |
| MD5 hash: | e49346735116f8fbc5033091612364db |
| humanhash: | lima-pip-south-chicken |
| File name: | a393af04b058f4fead2a0b08394407510445808c02ed8ae7f80c25b756137d78 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'061'896 bytes |
| First seen: | 2026-02-05 15:08:08 UTC |
| Last seen: | 2026-02-05 15:26:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'794 x AgentTesla, 19'692 x Formbook, 12'274 x SnakeKeylogger) |
| ssdeep | 24576:qstarDPVyMrJZtN3mN9okCtvTiwZD14t9Up7ajmPdKi:0rTBrJZtN3AMOw3f |
| Threatray | 3'616 similar samples on MalwareBazaar |
| TLSH | T1F835126DFE016E16CA7D0F77D013151843B08523AA72FAE9AACD44E10EFAB98CD4D653 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.