MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d28358e40350fd9a8b4433a33131b7f567d66c1f9a20b6bd276178b585304580. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | d28358e40350fd9a8b4433a33131b7f567d66c1f9a20b6bd276178b585304580 |
|---|---|
| SHA3-384 hash: | fd422409dce75f74ff86d149c3658f9f675e2dd17f28c38ae93f986e8496e2be3ca945bde6efbc75549c47b8f7427d16 |
| SHA1 hash: | 97aee3ae9960890ebb73b4976108ea9f9d441db9 |
| MD5 hash: | 47e6993ca2c8e088e5d25469d14f693e |
| humanhash: | tango-butter-kitten-xray |
| File name: | TEKLİF İSTEĞİ-52850_xlsx.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 804'352 bytes |
| First seen: | 2025-04-07 07:21:13 UTC |
| Last seen: | 2025-04-07 07:28:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:sY9YqBCCwfDruBa3OwYLej/8Plw1laJ5Q0StW/ihgdw8si:GfrXyeMiYe0GAjdw8 |
| Threatray | 1'711 similar samples on MalwareBazaar |
| TLSH | T1F905F064336CDC17D0B643F52921D27403BAAD9D7A21E3C66ED6BDCB38A1F815A007A7 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 0068617171617000 (6 x SnakeKeylogger, 2 x MassLogger, 2 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.