MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe5195961a44ebda2fb50661a60552ca264c8bc14000e5a8846f1f8ee0eb3db9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: fe5195961a44ebda2fb50661a60552ca264c8bc14000e5a8846f1f8ee0eb3db9
SHA3-384 hash: b8277c58f2bfcdf0a2c3773596c19f0a80d6575d53cd7be5e20ade77a3c2d860d5e7cfdb6c5ea47655745ff612d3d188
SHA1 hash: 4d39a5884c85b44b34810a9064018f3cbb0b0f43
MD5 hash: 705b3114cb15fa7bf4446348960658e0
humanhash: seventeen-single-crazy-william
File name:PO-012447.JS
Download: download sample
Signature AgentTesla
File size:6'027'834 bytes
First seen:2026-04-15 07:58:15 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:2fMdqFsESeNyu8mvm132AvlesD61fZcyEhXY1GUrnv4d0tdmFKStiwWEcwTsEQCh:2f4qFsESNulmgAYs2ZczhXYbnvZ7mFX7
TLSH T10C5694CCC0A4700998C2CF5FF562D9B1888E797A2E1D9AB2641FD4BC1D95F93A8105EF
Magika javascript
Reporter abuse_ch
Tags:AgentTesla js

Intelligence


File Origin
# of uploads :
1
# of downloads :
152
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
autorun lien
Verdict:
Malicious
File Type:
js
First seen:
2026-04-14T18:26:00Z UTC
Last seen:
2026-04-17T06:35:00Z UTC
Hits:
~1000
Detections:
Trojan.Win32.Agent.sb Trojan-PSW.Win32.Disco.sb HEUR:Trojan.PowerShell.Tesre.sb Trojan-Spy.Stealer.FTP.C&C Trojan-PSW.Win32.Stealer.sb Trojan-PSW.MSIL.Agensla.sb Trojan-PSW.Agensla.TCP.C&C PDM:Trojan.Win32.Generic Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Found potential dummy code loops (likely to delay analysis)
JavaScript source code contains functionality to generate code involving a shell, file or stream
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-14 23:34:59 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla execution keylogger persistence spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Looks up external IP address via web service
Checks computer location settings
Badlisted process makes network request
Family: AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments