MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0770133d27e47a0cbbac1ce9e1147182a607711907158b2f97b6dda8cea997d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 0770133d27e47a0cbbac1ce9e1147182a607711907158b2f97b6dda8cea997d7
SHA3-384 hash: 9550ef21a7fb6ae4868662dc73c5990630a61fd42a5fa7bb3697a4a19d6042b967e6252a796cef41a712e6c0a757cdc3
SHA1 hash: c2f2dff111acc1ce356a8cf71132beb50bdab16a
MD5 hash: 07eb6b28637c601a058c32f7dc9a8f7a
humanhash: vermont-two-magazine-kitten
File name:Invoice.pdf.7z
Download: download sample
Signature AgentTesla
File size:556'566 bytes
First seen:2020-08-31 09:18:03 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:8M2iP8orElGdrWDNy3+VZydECCN7LcVb4xHBV3Go1+3cQX7:8hgcy6xyuVgKx4Cz1N10X7
TLSH C6C4238D4DE741F3ACCD055EC4B8D2A1318BA5E4210BF0D7825D9997C2F2AD9E390AAD
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: gyp.gr
Sending IP: 46.227.62.27
From: DH CHONG <info@dorringolab.com>
Subject: Invoice Re-Confirmation
Attachment: Invoice.pdf.7z (contains "Invoice.pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-31 03:02:41 UTC
AV detection:
7 of 47 (14.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 0770133d27e47a0cbbac1ce9e1147182a607711907158b2f97b6dda8cea997d7

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments