MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d81dcd66ffb30e0b6d5977d6f146de84bf687ece732a2a7791ef50b85a316908. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 15
| SHA256 hash: | d81dcd66ffb30e0b6d5977d6f146de84bf687ece732a2a7791ef50b85a316908 |
|---|---|
| SHA3-384 hash: | 00ee1b026103a31ebaa2862c90fdc8b93a54e4f69ef6ee1d0843e47f78575c1da6c44f1737d263e7c67bcc67583083f5 |
| SHA1 hash: | 0dbd22a933f67c80721ed92e1c931302decdfa59 |
| MD5 hash: | 2db699ea6b48a16a9245a243f5f2229c |
| humanhash: | coffee-leopard-india-nineteen |
| File name: | d81dcd66ffb30e0b6d5977d6f146de84bf687ece732a2a7791ef50b85a316908 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'220'608 bytes |
| First seen: | 2026-02-05 14:58:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1895460fffad9475fda0c84755ecfee1 (441 x Formbook, 149 x AgentTesla, 73 x a310Logger) |
| ssdeep | 24576:J5EmXFtKaL4/oFe5T9yyXYfP1ijXdahfHIe/8ZZz9o028:JPVt/LZeJbInQRahfoe/0l9o0 |
| Threatray | 5 similar samples on MalwareBazaar |
| TLSH | T1A245BF027391C062FFAB92334F56F6115BBC7A260123AA1F13981D79BE705B1563E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'644 x Formbook, 1'203 x CredentialFlusher, 911 x AgentTesla) |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
f273faa36ce80530b010b467cebaa8a61ee6ad36754314f85e82b4079f34824a
8f1d654b95b445a8f398e7c6a7b779106533526b45741fd3921a7d44584c915a
4f3ec11e21c51ccba5632b9dc1cf5b6da6d5eedbc5cdada85de4d1788effc6ae
a4e316896cd7e3cef47c5dca6681813b151d34cc16e9807c62db27c0f2c6508e
3725b84aa81f643a91d085c07db5c804995689c4d603e2e83ae83910c0f32ded
fe10d9040d9e7798c014a11dce746dcac3fb6ca3fd72de0604f9812331e03a55
e270934364c50b66e49dbca385c86f10db6f6522605910aacf969dc725b1249e
e0fbfdc8695afc9e7186cccb32a9d8b8e088745766ede99bc8a5f6d93f42a2be
d81dcd66ffb30e0b6d5977d6f146de84bf687ece732a2a7791ef50b85a316908
3f60c3f739617108102716e98f17f21f62da0e470c6eafe319735687376437c9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | TH_Generic_MassHunt_Win_Malware_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Generic Windows malware mass-hunt rule - 2025 |
| Reference: | https://cyfare.net/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.