MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d7093e702ca2995bfe864781a9476419a95efcd51d29805ce721021da24e4e94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | d7093e702ca2995bfe864781a9476419a95efcd51d29805ce721021da24e4e94 |
|---|---|
| SHA3-384 hash: | 359aa6951c250c2624f188a51851a48c1d379e4429ab3b33b9b8d8fd5bfbb6903a43a9327d4b61df1d9b0859689887c3 |
| SHA1 hash: | 0b1022cd4c5cbcf4fd816d2dc0aef57f9de7c38a |
| MD5 hash: | 8c35eb270299bd0ac4a09c5c611de995 |
| humanhash: | tennis-crazy-early-violet |
| File name: | file.exe |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 171'008 bytes |
| First seen: | 2023-08-17 13:26:11 UTC |
| Last seen: | 2023-10-17 14:08:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'664 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 3072:11v1X4jT1w7/PUJL1BzCbIwb402rEBdQ7DoOLDwj/:11Gpw7/PCB8kLrQdNz |
| Threatray | 5'500 similar samples on MalwareBazaar |
| TLSH | T195F34C68A38A9D11F32D057DC8B101480AB3A1479F57E79D0EA1ADF63E067C3772ECA5 |
| TrID | 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.8% (.SCR) Windows screen saver (13097/50/3) 8.7% (.EXE) Win64 Executable (generic) (10523/12/4) 5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
fad0d8e90ff191c8ba6dfcab31ae3ecb976a15ccf5c7ac1180964142f4e07aed
ea8e979a9bf6fe2e8af35cedb5d639091629a2ce626f1339c7a0a48e3cc39ba2
92f3837130daa9283bdbeb153a7f398bbb6e9314f4c9aa3356227b7166ac3735
f53110f7faed128650f2a39022367e05761d34759d9677af73d3e1d094571fe8
5bf9650656fe6f20f30b485b93dac76810cacd268e7acbc6c2c702174bbb6f87
c0411ae869eeeaf9bce9b7044dcaa2ed931100da22b133ae85ccad45f7499f54
05b6a5d5670beafdc5e9f6e194b1afe8340447cb9d2943e1e6385e5fb47200dd
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV4 |
|---|---|
| Author: | Rony (r0ny_123) |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | MSIL_SUSP_OBFUSC_XorStringsNet |
|---|---|
| Author: | dr4k0nia |
| Description: | Detects XorStringsNET string encryption, and other obfuscators derived from it |
| Reference: | https://github.com/dr4k0nia/yara-rules |
| Rule name: | msil_susp_obf_xorstringsnet |
|---|---|
| Author: | dr4k0nia |
| Description: | Detects XorStringsNET string encryption, and other obfuscators derived from it |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.