MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 11 File information Comments

SHA256 hash: a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081
SHA3-384 hash: e21e97931509e853a18530c080b4c51766dea0e14d05e1d02dc3728f3e79cabfb90086d4bc9d3795dcbfa9edf56341ee
SHA1 hash: 4901faf8d5f1ab17f86fde39ce4bd4aa26bb6115
MD5 hash: df9254ae6077c0764f529e91727aad6d
humanhash: sixteen-three-berlin-kilo
File name:a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081
Download: download sample
Signature AgentTesla
File size:1'144'320 bytes
First seen:2025-12-08 15:27:53 UTC
Last seen:2025-12-09 12:22:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 91d07a5e22681e70764519ae943a5883 (130 x Formbook, 32 x a310Logger, 27 x AgentTesla)
ssdeep 24576:utb20pkaCqT5TBWgNQ7ahpXy4lyDWU6A:bVg5tQ7ahpCwyD/5
Threatray 2'735 similar samples on MalwareBazaar
TLSH T1BE35C02273DEC360C3B25273BA657741AEBF782506B5F56B2FD4093DE820122525EA73
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon aae2f3e38383b629 (2'644 x Formbook, 1'203 x CredentialFlusher, 911 x AgentTesla)
Reporter adrian__luca
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
98
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
AutoIt
Details
AutoIt
extracted scripts and files
Malware family:
agenttesla
ID:
1
File name:
a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081
Verdict:
Malicious activity
Analysis date:
2025-12-08 23:53:22 UTC
Tags:
stealer ultravnc rmm-tool exfiltration agenttesla netreactor smtp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
autoit emotet lien
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Restart of the analyzed sample
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a service
Changing a file
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-21T03:20:00Z UTC
Last seen:
2025-12-10T08:24:00Z UTC
Hits:
~1000
Detections:
Trojan-Dropper.Win32.Dorifel.sbd Trojan.Taskun.TCP.ServerRequest Trojan-PSW.MSIL.Agensla.d Trojan.Win32.Auzenpak.sb Trojan-Spy.Agent.SMTP.C&C HEUR:Trojan.Win32.Generic Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Disco.sb Trojan.Win32.Inject.sb Trojan.MSIL.Crypt.sb HEUR:Trojan-PSW.MSIL.Agensla.a Trojan-PSW.MSIL.Agensla.sb Trojan-PSW.MSIL.Agensla.acjq Trojan.Win32.Zenpak.sb Trojan-PSW.Agensla.TCP.C&C Trojan-PSW.MSIL.Agensla.g Trojan.Win32.Strab.sb
Gathering data
Verdict:
Malware
YARA:
7 match(es)
Tags:
AutoIt Decompiled Executable PDB Path PE (Portable Executable) PE File Layout Suspect Win 32 Exe x86
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-11-21 07:24:50 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
26 of 36 (72.22%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla discovery keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
AgentTesla
Agenttesla family
Unpacked files
SH256 hash:
a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081
MD5 hash:
df9254ae6077c0764f529e91727aad6d
SHA1 hash:
4901faf8d5f1ab17f86fde39ce4bd4aa26bb6115
SH256 hash:
7a12c025ca757e11212ea02fc9a09b229527b4af876c9311464d661c897d3539
MD5 hash:
000769041b15a80c6057c255eb4e1d94
SHA1 hash:
fdbec76aec29a1ba4dd3bee7874641eb3f9577d8
Detections:
win_samsam_auto SUSP_OBF_NET_Reactor_Native_Stub_Jan24 MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine
SH256 hash:
c67b668d78ec591eda8999a6b8e8120f3e5ed746009289a83bcfe9bf4007b10e
MD5 hash:
2f66d8c8cc967d2d63a0ade676721b31
SHA1 hash:
6667c5ad5bf895fed91c37a2d7a2cbf2afb73031
Detections:
AgentTesla SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021 Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
SH256 hash:
7c12609ffd6f5c821be6e6bf3b417eee4c1d65006d281fd693eec10b8345b4a0
MD5 hash:
de7beca9b8906d030f54bc90b9183a5b
SHA1 hash:
cc2808ae4ff2c12c8fe8a29bd68b4b46270bc257
Detections:
AgentTesla SUSP_OBF_NET_Reactor_Indicators_Jan24 Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:NET
Author:malware-lu
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:win_samsam_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe a4445ce5e4de1cb6fb8b1edc36bf9e7a3753014e93978db6c4df6bff617e6081

(this sample)

Comments