MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d210faa70538372cef9aa35db27b9e6fefe9b66e65ba7d1eb948cc07f746129e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: d210faa70538372cef9aa35db27b9e6fefe9b66e65ba7d1eb948cc07f746129e
SHA3-384 hash: c58d0fc512cdcceaf93cbc718511f45da8b56b58731c2ebcc5574ba3f4fdf1ba6e1cdbb6b5a9a7b6dbe117a2fb8e7750
SHA1 hash: 522fcd3a8f670b1cbaf206b9283f3a8d9b0d8d43
MD5 hash: 72adb4edbe3d9186fdfac014034fb709
humanhash: river-princess-illinois-april
File name:Nuovo ordine.tar
Download: download sample
Signature AgentTesla
File size:2'160'011 bytes
First seen:2026-04-15 12:23:48 UTC
Last seen:Never
File type: tar
MIME type:application/x-rar
ssdeep 49152:0J475c6eYg02G9pAvlzsFXseW1U8CiwOWICKaT:W4+6lV9pANsEfCnICKw
TLSH T1ECA5335F7C20633C992EE382D6921F075E92A3C4B0E11577C05A74CBF2FA491CB8A59B
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter JAMESWT_WT
Tags:AgentTesla ftp-crescentegramas-com-br sativagina--crescentegramas-com-br Spam-ITA tar

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Nuovo ordine.JS
File size:6'690'054 bytes
SHA256 hash: a5bcd997e541d7fbf90266152e2d1a4e8780ec6db17c580723571b74cd6d9ad4
MD5 hash: e9c28ab7d94c9262d869e58dfab9883d
MIME type:text/plain
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug autoit dropper evasive expired-cert fingerprint keylogger obfuscated repaired
Verdict:
Malicious
File Type:
rar
First seen:
2026-04-15T07:50:00Z UTC
Last seen:
2026-04-15T09:36:00Z UTC
Hits:
~10
Gathering data
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2026-04-15 12:24:49 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
5 of 24 (20.83%)
Threat level:
  2/5
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:agenttesla family:donutloader discovery execution keylogger loader spyware stealer trojan
Behaviour
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Detects DonutLoader
Family: AgentTesla
Family: DonutLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments