MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8e7131b8bbbfa3693d17161e00b5d4a0ad9091ffbc1b9917f4d239ba7f314ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: c8e7131b8bbbfa3693d17161e00b5d4a0ad9091ffbc1b9917f4d239ba7f314ac
SHA3-384 hash: 7b0262927df64892f0bcabe23449b72c1cc0221dd9c1dc610427a96682fdfb1211b31f9348d88d921125c068f72af4bf
SHA1 hash: dcae1a468536648975e6849bf74287cbfb355c92
MD5 hash: ae93864982dad21c5bfc381fdac03d96
humanhash: tennessee-pennsylvania-sweet-iowa
File name:CopiaDelPagamento14042026.exe
Download: download sample
Signature AgentTesla
File size:651'660 bytes
First seen:2026-04-14 09:06:36 UTC
Last seen:2026-04-14 09:43:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 46ce5c12b293febbeb513b196aa7f843 (27 x GuLoader, 15 x RemcosRAT, 5 x VIPKeylogger)
ssdeep 12288:0X4jwQ0CnmQC9Qf4Ct8v5kFoTNdvR0t1DVP8EAl4soOBRvAnBs97gTd2h5YwvDlv:u4jwQPR2kSvtZstN2NBRvZ/
TLSH T1EAD423017924C453F3322AF1DC6A8F726AE87C64F6518A5F2BC03E4F7DA7951780EA91
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon b63439b069f0d89e (1 x AgentTesla)
Reporter JAMESWT_WT
Tags:46-183-222-116 AgentTesla exe ftp-holzbrenzii-com Spam-ITA

Intelligence


File Origin
# of uploads :
2
# of downloads :
169
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
CopiaDelPagamento14042026.tar
Verdict:
Malicious activity
Analysis date:
2026-04-14 08:22:52 UTC
Tags:
arch-exec stealer evasion ftp exfiltration agenttesla

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.9%
Tags:
injection obfusc blic
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file in the %AppData% subdirectories
Creating a file
Searching for the window
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug fingerprint installer installer installer-heuristic microsoft_visual_cc nsis soft-404 unsafe
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-14T05:08:00Z UTC
Last seen:
2026-04-16T06:39:00Z UTC
Hits:
~1000
Detections:
Backdoor.Androm.HTTP.Download Trojan.Win32.Guloader.sb Trojan.NSIS.Makoob.sba Trojan-PSW.Win32.Stealer.sb Trojan-PSW.MSIL.Agensla.sb Trojan-Downloader.Win32.Minix.sb Packed.NSIS.Krynis.sb Trojan.Makoob.HTTP.C&C PDM:Trojan.Win32.Generic Trojan-PSW.MSIL.Agensla.d Backdoor.Win32.Androm.wcqc
Gathering data
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-04-14 08:18:02 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
24 of 37 (64.86%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:agenttesla family:guloader discovery downloader keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Family: AgentTesla
Family: Guloader,Cloudeye
Unpacked files
SH256 hash:
8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c
MD5 hash:
9b38a1b07a0ebc5c7e59e63346ecc2db
SHA1 hash:
97332a2ffcf12a3e3f27e7c05213b5d7faa13735
SH256 hash:
b1350f487692057c8ffde75dcc55287a52a3272240d4d4912f24464b27551fc0
MD5 hash:
8f0e7415f33843431df308bb8e06af81
SHA1 hash:
1314272e6ad3be1985d4a1607b890a34b0bde8b5
SH256 hash:
c8e7131b8bbbfa3693d17161e00b5d4a0ad9091ffbc1b9917f4d239ba7f314ac
MD5 hash:
ae93864982dad21c5bfc381fdac03d96
SHA1 hash:
dcae1a468536648975e6849bf74287cbfb355c92
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments