MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 afe92b2d15043b10ec2fde12c06a011bf7f4e1eba1fc142aa8eebe157730e4b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: afe92b2d15043b10ec2fde12c06a011bf7f4e1eba1fc142aa8eebe157730e4b7
SHA3-384 hash: 2a46372737f85166ac53132f71a5df78a4e127250b39b9ba2339a9af750ab4525b04ac7f790c5eaa9e8db7c46559d891
SHA1 hash: 6fba2f47104ad16600a782358a6796ab37dab5e9
MD5 hash: 16e82be142266760a80a283297e46288
humanhash: lion-salami-jig-wolfram
File name:DVifnhgEoQEIncqX.js
Download: download sample
Signature AgentTesla
File size:352'434 bytes
First seen:2026-03-25 12:21:50 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 6144:9R+ncV0iKnqM9+N4jmMZDyG07MimK7fXPdOW8xEO693XiGRlKsaLi7evwET5:LicVEqM9+N4dDB0wimK7XdOW8xEH93yl
Threatray 3'716 similar samples on MalwareBazaar
TLSH T1B9745B5263EE4108F1F74F88AA7640A54AB7BE662D39D02D06AD144D0EF3E14D8B67F3
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Magika autohotkey
Reporter James_inthe_box
Tags:AgentTesla exe js

Intelligence


File Origin
# of uploads :
1
# of downloads :
130
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-03-24T23:23:00Z UTC
Last seen:
2026-03-26T06:18:00Z UTC
Hits:
~1000
Detections:
PDM:Trojan.Win32.Generic HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-25 04:18:29 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 23 (26.09%)
Threat level:
  2/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla execution keylogger persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Looks up external IP address via web service
Checks computer location settings
Registers new Windows logon scripts automatically executed at logon.
Badlisted process makes network request
AgentTesla
Agenttesla family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments