MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb834ba457062fb3f9a74dfaa72f8163cbb81a1ef2bb2b506a97b4981680bbf2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 18


Intelligence 18 IOCs YARA 23 File information Comments

SHA256 hash: bb834ba457062fb3f9a74dfaa72f8163cbb81a1ef2bb2b506a97b4981680bbf2
SHA3-384 hash: 596d8c9c742c141e07a9627b65ac2a52b93643dd1d40774cec261997d3821674fc0a66297eee3cffe33e5e41d293af99
SHA1 hash: 2471a26730269c480c598206648071984827d6c2
MD5 hash: 7e89d8a408538b111eb2314728af9d08
humanhash: bravo-march-finch-autumn
File name:z60CVMarianaEslava.exe
Download: download sample
Signature AgentTesla
File size:1'044'480 bytes
First seen:2025-06-10 13:00:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger)
ssdeep 12288:Gtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgal7VE+wIf4PhBMZ5yneh:Gtb20pkaCqT5TBWgNQ7a54Ewy9hV6A
Threatray 2'237 similar samples on MalwareBazaar
TLSH T18F25CF1373DDC361C7B25273BA25B701AEBF782506A5F96B2FD4093DE820122525EA73
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter FXOLabs
Tags:AgentTesla exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
480
Origin country :
BR BR
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
CV Mariana Eslava.zip
Verdict:
Malicious activity
Analysis date:
2025-06-10 15:33:23 UTC
Tags:
arch-exec esher evasion stealer smtp exfiltration agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Connection attempt
Sending an HTTP GET request
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context autoit compiled-script control evasive fingerprint keylogger lolbin microsoft_visual_cc packed packed packer_detected schtasks wmic wscript
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-06-10 13:01:08 UTC
AV detection:
12 of 36 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Verdict:
Malicious
Tags:
external_ip_lookup
YARA:
n/a
Unpacked files
SH256 hash:
bb834ba457062fb3f9a74dfaa72f8163cbb81a1ef2bb2b506a97b4981680bbf2
MD5 hash:
7e89d8a408538b111eb2314728af9d08
SHA1 hash:
2471a26730269c480c598206648071984827d6c2
SH256 hash:
6e2d33ad47fe4343882ec998070abeb4262cdc54dce8b240d2483949981f7f41
MD5 hash:
3ec655b176ae7e0b0134692effb72d65
SHA1 hash:
d9e1c39be5a3c9545258343c46bfc7d96ffd5d20
Detections:
win_agent_tesla_g2 AgentTesla Agenttesla_type2 INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Parent samples :
1aaa5aaebdfb1a1f60634fe733257d0621a77da596771ca0d8914189430c41e2
7631877fb3e39b166e33ffc6beeba1c64d6c5c7d7d8c9c0035f9148e65dedccb
1ca3657cd2803465b07937e912d1bc1781d5e437b07bb9d118645cb0599110ab
a40502b33475744c06fac08ad062a9e2d8a31a71e7c3cd3fb7d4e21580ca3a4b
9117dab0312989744b6e6ac07f22431db33e5bd2a0d58b7dbb6b6ce69e9e1c66
2ebf37ae193f3e680a3369e02edb85545f5ae0382b846a8211d0662f21ac024d
799f48251310902c9372dbd6b0d17658461c28a3fdd74db57558deb76d04c3f8
79ba6d4b1a72cf33793c21c893ef7c4755eb0aab2c808b4cf49e1b572844f3b4
35ae90a081aa0fb9930d285e0215e006220cccc4f074ca231c19fb4422c836dd
6f00f348126adeba40db7a0a0947f78b9eee52d50cd269569c35dab6b0a37275
9908fccf446f0460a87404fcc3c051357832967706a1815d16cba1ea0ce5c3ca
3a88c86e051bf366bc81c240ac8c266ed9216238fc25a85eddfbfb731b026444
bb834ba457062fb3f9a74dfaa72f8163cbb81a1ef2bb2b506a97b4981680bbf2
fd2fe089bf77fba72d42ec03a55eb1edfb153e36a83bba85919ec56d526cb77a
650e24c12f099e59d9ae6425826eb805a5b93f3e9c683e2df9e8b11166f76958
b0d59ba57e0133e0c0ded26697a10533c733ebc54728790adb9415b2c5b44d1a
4959b15758b81f5020c2cff99fca0424a8497d8b36ed8aaa03b3813bb0d01cb1
78d8580a855001e0004d42a2e18586eeee2695eb81a11f9cf0565164ae3f8c56
ba2ba7c94c01b9a9ce71d91d9bf3a86d86665637651773b3a767623fe5f5f1ed
b34f31577a5139bfc13f9ee4d4f057369f0aa75f1b0da100bd7b4c30241a517e
782dc5a532c6cc2e8638a8917e12a4858320b803c9d3970e76513c316d558762
57ad6fdd7b09ea801330e6a24b8fa895d5cd911151cc46a078b81a1ae65be1c3
22ce0fc4c135f820460a29b123de6baa715d2dc0fdcd04aa95148f1c4714dc3a
d44e06929bea3996cd295fe7d912689c2091483dc5bbcd46facefa156ebfb51a
11a9f7b2ead3bb1dfb848d5b9f5a6f5dca54bcd19b71a4c8c717fa0355326b2a
ed306b895449703ba1bcae5da3d7ef301c2bd18d14c8488c1219b8aad705dc48
e9581f6d2a21cb2532a383010c09d21d099ebf3a9c9a6b513579895173032fc4
cf19f2a44333cb9f958e4064ca17558d18d164a2eb11f2df0302703e16720959
95bbb7474ad4ecf6911477c0e1f4ff6e9054c570935c806d0dcc7548a2a953bf
107e8e3d9fad6ed941665ffe8f28bd0f463fc872953c5200bd81755c84cfc002
6192479deb2070fdecc26d6f5da47fbf3608f4830f031363f75d7ed04dccff51
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:agentesla
Author:Michelle Khalil
Description:This rule detects unpacked agenttesla malware samples.
Rule name:AgentTeslaV3
Author:ditekshen
Description:AgentTeslaV3 infostealer payload
Rule name:AgentTeslaV5
Author:ClaudioWayne
Description:AgentTeslaV5 infostealer payload
Rule name:Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_GEN01
Author:ditekSHen
Description:Detect packed .NET executables. Mostly AgentTeslaV4.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID
Author:ditekSHen
Description:Detects executables referencing Windows vault credential objects. Observed in infostealers
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Trojan_AgentTesla_ebf431a8
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe bb834ba457062fb3f9a74dfaa72f8163cbb81a1ef2bb2b506a97b4981680bbf2

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
IPHLPAPI.DLL::IcmpCreateFile
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments