MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ecb71b8bbd61e8aced9617d5faa6bec690ea0fffe4afb8cd6dd33dc9aac1640. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2ecb71b8bbd61e8aced9617d5faa6bec690ea0fffe4afb8cd6dd33dc9aac1640
SHA3-384 hash: d1b487cf6ed6adb5ee6e2489539ae7180251a772fd583471cc58808a7fa610b132c23f535cef67c0987f4d853ac1e13f
SHA1 hash: d11c7d5ddec1da3b37127ca3f300909abba8dd6a
MD5 hash: 60bf45132871eeb9228212cdbd89107a
humanhash: stream-lima-xray-mars
File name:PO FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER.7z
Download: download sample
Signature AgentTesla
File size:385'947 bytes
First seen:2020-04-03 17:42:29 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 6144:5WrBw9MM+4nnqXpze0ZiuAi/tq5jYtB+ivW2I9s7SW+kD+JC70UnrpUfrCRXCt+l:5W9w9MMtqXpzhZZ9FgYfEB9SHD6W0my6
TLSH CF842340B4E8CB9BDD218D6A41D19330B7678DE9B2F14344777FAD60A09AAB19C0F79C
Reporter abuse_ch
Tags:7z AgentTesla COVID-19


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: h55.sserv.ru
Sending IP: 95.215.177.133
From: ITALIA NORTH <vladimir@naksealing.ru>
Subject: URGENT COVID-19 ORDER ITIALIA SEPA
Attachment: PO FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER.7z (contains "PO FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER.exe")

AgentTesla FTP exfil server:
ftp.fox8live.com:21 (207.191.38.36)

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Genkryptik
Status:
Malicious
First seen:
2020-04-03 18:35:45 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
15 of 47 (31.91%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 2ecb71b8bbd61e8aced9617d5faa6bec690ea0fffe4afb8cd6dd33dc9aac1640

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments