MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b0594d6fdfa80ec3898635d6c618a0f5964b89ae7183a08ea635fc4e82070aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2b0594d6fdfa80ec3898635d6c618a0f5964b89ae7183a08ea635fc4e82070aa
SHA3-384 hash: acb4a4d62f917a1d7b023d744e3fb7b4e34254436b43f9558f763694fa2ea5d01e2c3ca9b6e7278db7d8c92d9c67c496
SHA1 hash: 32c1e7541472453cd14221ea935587f7fedacd07
MD5 hash: c94607df6a4fe49ff1a4e39c070d1a4a
humanhash: april-black-spring-ack
File name:Payment Copy.7z
Download: download sample
Signature AgentTesla
File size:632'235 bytes
First seen:2020-08-18 07:33:11 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:1hT3OzWb5DwZGDvCxf+jXOOpl3TsghvrKbLpv7z8oi9MRuQ/h:cW+GDa8jplDlhGLpRio5
TLSH 1BD4234D1D01A7A22149A9FBE9EDB6403D02F7ABCD233AF8021FDAA4D4154A46BFD1D0
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

From: "Jolly Nabakunda" <finance@mrhmarine.com.my>
Subject: FW: Payment Copy
Attachment: Payment Copy.7z (contains "Payment Copy.exe")

AgentTesla SMTP exfil server:
us2.smtp.mailhostbox.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-18 07:35:06 UTC
AV detection:
19 of 48 (39.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 2b0594d6fdfa80ec3898635d6c618a0f5964b89ae7183a08ea635fc4e82070aa

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments