MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d19021ad93acc1bca2ff9b16d15b5bd97c3783c0ecb7e35dbe467d9a70fd52b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA 3 File information Comments

SHA256 hash: d19021ad93acc1bca2ff9b16d15b5bd97c3783c0ecb7e35dbe467d9a70fd52b6
SHA3-384 hash: 20c74f1e30084fd24a9941150be029312387b20f5fdb5f66bcb1eab6a618d3d1e20e254443fe491282844213aee8fe50
SHA1 hash: 1c68204f334ad199f0106f1a085dfc69da1a51cf
MD5 hash: 69d79d890c684984ddbbaaa5d9db0e68
humanhash: mobile-table-victor-lamp
File name:708e198608b5b463224c3fb77fcf708b845d0c7b5dbc6e9cab9e185c489be089.zip
Download: download sample
Signature AgentTesla
File size:484'528 bytes
First seen:2025-12-11 07:32:02 UTC
Last seen:2025-12-11 07:37:54 UTC
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: infected
ssdeep 12288:5y+GHN7rGSJXEfxRZ08+RT0baKM8rvW+rVIDET5X:51GtGSoF084WaK3zWxwlX
TLSH T1FCA423937CAAC53D7BE789FC31D664B0CBE844F04A5A04B59F613079B48C6A234EA4D9
Magika zip
Reporter Malan
Tags:AgentTesla zip

Intelligence


File Origin
# of uploads :
4
# of downloads :
58
Origin country :
FR FR
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:708e198608b5b463224c3fb77fcf708b845d0c7b5dbc6e9cab9e185c489be089.exe
File size:950'272 bytes
SHA256 hash: 708e198608b5b463224c3fb77fcf708b845d0c7b5dbc6e9cab9e185c489be089
MD5 hash: 80b51e872031a2befeb9a0a13e6fc480
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
agenttesla virus micro msil
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:MALWARE_Win_AgentTeslaV3
Author:ditekSHen
Description:AgentTeslaV3 infostealer payload
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments