MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c58f00ebaa480be1e15e9afe762f4c5d8d9206db604932d522078f838efea0bf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 15
| SHA256 hash: | c58f00ebaa480be1e15e9afe762f4c5d8d9206db604932d522078f838efea0bf |
|---|---|
| SHA3-384 hash: | ca02c9dba2bbc30f09fb29af0518353832eafe7bec73d0de30c56f3770244361fdcdfa14e6153082cbe8537e05248376 |
| SHA1 hash: | 52c9a50940e064c3a16429aa5d024715111783cd |
| MD5 hash: | 7b893fefed678f8938da447efc3d28bc |
| humanhash: | oven-moon-aspen-fish |
| File name: | hesaphareketi-01.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 711'680 bytes |
| First seen: | 2025-07-04 06:55:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:AH2LGu80q2/BOT8r8J2kbUj9DERZoM3M8rb/MXmsIcUv0:i2s2/8q2UZQzoylb0XmsI/v |
| TLSH | T141E4DF832645556FD0DBFAB60412E0B403BC9D99E241E79ECBE0BDF7FC66E162980253 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| dhash icon | a25337335bbb1bba (5 x SnakeKeylogger, 3 x Formbook, 2 x VIPKeylogger) |
| Reporter | |
| Tags: | AgentTesla exe geo TUR |
Intelligence
File Origin
SEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | agentesla |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked agenttesla malware samples. |
| Rule name: | AgentTeslaV2 |
|---|---|
| Author: | ditekshen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AgentTeslaV2 |
|---|---|
| Author: | ditekSHen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Generic_Threat_779cf969 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.