MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e4e848a310b4de7073eb9d2cd62b83ef678d15142aeec408457db4bcbaf85e50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 16
| SHA256 hash: | e4e848a310b4de7073eb9d2cd62b83ef678d15142aeec408457db4bcbaf85e50 |
|---|---|
| SHA3-384 hash: | abf122dcffbb90a6356aec2b8b55f89f409740bdcac6c53895f12429839b5aa19eda1d798c24a6ba40510f702135cd69 |
| SHA1 hash: | 46d7e2038ce26ecc2f401455ffa5728ae9a821ec |
| MD5 hash: | a36414388a4c9b1f64ce1387c212fef8 |
| humanhash: | victor-red-twenty-london |
| File name: | e4e848a310b4de7073eb9d2cd62b83ef678d15142aeec408457db4bcbaf85e50 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'084'928 bytes |
| First seen: | 2025-11-06 10:49:11 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1895460fffad9475fda0c84755ecfee1 (309 x Formbook, 52 x AgentTesla, 36 x SnakeKeylogger) |
| ssdeep | 24576:H5EmXFtKaL4/oFe5T9yyXYfP1ijXdaKtVbs3rLTii:HPVt/LZeJbInQRaKkb |
| Threatray | 3'824 similar samples on MalwareBazaar |
| TLSH | T19335AE0273D1C062FFAB91334F5AF6115BBC79260123AA2F13981DB9B9705B1563E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | AgentTesla exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
938d90bf1bb3fcb3c7352990f0c05603b0208bee21b6e3d02b5f0cab97f7f35d
45d6e5b2dacebda7fb57eb80b6cf8d687374093bce58df7ab0d0209ba5581ff5
32c3f7fad7b8cfa7be3f0d61f46a44c6a169887d3b4f05d8ec82a046670d9a1f
8bdee3f4c6e55e34c73242cee7d02b02bed8a4012d5f750a1c58764668c4ef0f
4629429c6580e37102e85085e8aa7fb5d1bf24cb7b98119d097640b7c817a269
c44e9dcbb9d3394f1b35cf23664fa25933ac29d31c7dcf172dde7ea4c6d2758b
397e3a2415c7ad96aa9926bfc0ac5e9fd5ce67ec75a1cb43ab429371a8cb91b9
e4e848a310b4de7073eb9d2cd62b83ef678d15142aeec408457db4bcbaf85e50
a477297b83ed7373815d26e0f3d540bddd4a4f1475793bb4499067e0c910307b
fdbec09df358a6de79ebf72adfc5c12d4e8229dee441b0bd31d93bd139052885
cf118d7cd9cc07aab509ba2dc2d6ee60a9a81dc4c66da52960e1438f2bc5fef3
9b67bec1b3ccffb19f0b95ca5c014af55a8405cb1e150ed04ec41065c9388536
c18a28db58ee110d99668d90c2deede8ea10ba850799d8495ad7cd53488fb575
02423be0add1db8a4df4f424108420b01dab4c4c1dc23ded7abd62fa89895882
e704a09ab8b30ae9b7d198cb9187a4ed48649350fcb3f669444381aed6f27651
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV2 |
|---|---|
| Author: | ditekshen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTeslaV5 |
|---|---|
| Author: | ClaudioWayne |
| Description: | AgentTeslaV5 infostealer payload |
| Rule name: | Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | MALWARE_Win_AgentTeslaV2 |
|---|---|
| Author: | ditekSHen |
| Description: | AgenetTesla Type 2 Keylogger payload |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | TH_Generic_MassHunt_Win_Malware_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Generic Windows malware mass-hunt rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | Windows_Generic_Threat_9f4a80b2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.