MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06d6781070329e201caed6140b0c81fd1f4555c36a03cfb40f7b3812a877c0c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 06d6781070329e201caed6140b0c81fd1f4555c36a03cfb40f7b3812a877c0c3
SHA3-384 hash: c77c8a545765a2fb731105af6868f932e922fc2254069d0d15083aeeadf65e021bf67f666c4d8bb37cd382f6db18f861
SHA1 hash: cf21c2a0e994092973e11bd2efa6733fa12209bc
MD5 hash: 0fba828e41a6b4910a73ad1bd7e550b1
humanhash: fillet-asparagus-thirteen-mango
File name:Xeros_ Covid.19_ urgent_information_letter.xlxs.iso
Download: download sample
Signature AgentTesla
File size:512'000 bytes
First seen:2020-04-20 14:37:16 UTC
Last seen:Never
File type: iso
MIME type:application/x-iso9660-image
ssdeep 12288:7Z+e3jB4YTznVbkuBXW+7HIHYRf8uTj3dnjYlU:P94YTzG8LI4RfLTNYG
TLSH 4DB401857A1C9A47DE7E08F59092204017F6965EE5A6E7F53F8CE0E78BC37CA08017A7
Reporter abuse_ch
Tags:AgentTesla COVID-19 iso


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: linux887.grserver.gr
Sending IP: 185.4.133.240
From: WORLD HEALTH ORGANIZATION (WHO) <healthcaresupport@who.int>
Subject: URGENT INFORMATION LETTER:COVID-19 OUTBREAK/ NEW VACCINES/SAFETY MEASURES
Attachment: Xeros_ Covid.19_ urgent_information_letter.xlxs.iso (contains "Xeros_ Covid.19_ urgent_information_letter.xlxs.exe")

AgentTesla SMTP exfil server:
smtp.yandex.com:587 (77.88.21.158)

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Geniso
Status:
Malicious
First seen:
2020-04-20 16:23:01 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
18 of 31 (58.06%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

iso 06d6781070329e201caed6140b0c81fd1f4555c36a03cfb40f7b3812a877c0c3

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments