MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2792434c76d0ff96d1d244fe271b622bb1fb53be002ef28a9ce96ee4e670e1f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2792434c76d0ff96d1d244fe271b622bb1fb53be002ef28a9ce96ee4e670e1f8
SHA3-384 hash: b109fde36bb5905d5ba727fa09eaab22a0475eb9d25bce4aee721c069740394a29015b50a5b7143dee6d9c2833a12ba4
SHA1 hash: 187fc5c46a98efe6a62f5fb9712c5b37bbaf48c1
MD5 hash: 2f75d26079c788b1286551af44a51dd6
humanhash: lake-social-washington-kentucky
File name:PO For-COVID-19 Products.zip
Download: download sample
Signature AgentTesla
File size:379'865 bytes
First seen:2020-04-06 10:51:24 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:oVz5r9Vd+ABnGN15CYUVjTDiPQZ7V7SC7IxKdzanFb4rzk3DXKMYDEmGa0GO:Az5r9SAhRNdVPIx6anFb4rzkjKMYvGaC
TLSH DD8423AD42BB82D10E636186074BC31395B3CED1946470AF6F44B21D7F9E793AD933A2
Reporter abuse_ch
Tags:AgentTesla COVID-19 zip


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-06 11:36:16 UTC
File Type:
Binary (Archive)
Extracted files:
22
AV detection:
28 of 47 (59.57%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 2792434c76d0ff96d1d244fe271b622bb1fb53be002ef28a9ce96ee4e670e1f8

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments