MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ffd507ca8450d0d6be84c4e7850490779aebf468089827a60a4e27b53e7aad4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7ffd507ca8450d0d6be84c4e7850490779aebf468089827a60a4e27b53e7aad4
SHA3-384 hash: 63c5922c553e636a3e6898b076b31a569f0b720b2649bf60b771837e5e0e11caaa0ab5d19043baaff06d1579ad78e294
SHA1 hash: 41cadf5d7b5b1ecc8db8f5c0df1ee38bcc1dc9d5
MD5 hash: 2d8e2f9c8e17c0875dcec97ff44e4ffa
humanhash: fifteen-uniform-three-nebraska
File name:factura 122.7z
Download: download sample
Signature AgentTesla
File size:588'873 bytes
First seen:2020-08-12 16:18:02 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:sgcQ7EpVKW4YKsvuWJlwgtV2U0L8WutGSDK4TliLV4H:kM0KKKsbsL8HtGSDKzA
TLSH 79C4239683AA2B0F9EC3E05AA553077DC77606E3130BB4436F1EF95C3A316A96C70917
Reporter abuse_ch
Tags:7z AgentTesla Yahoo


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: sonic315-33.consmr.mail.gq1.yahoo.com
Sending IP: 98.137.65.57
From: Gradinita Ambliopi <grad.ambliopi@yahoo.com>
Subject: factura.
Attachment: factura 122.7z (contains "fact.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-12 16:19:05 UTC
AV detection:
5 of 48 (10.42%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 7ffd507ca8450d0d6be84c4e7850490779aebf468089827a60a4e27b53e7aad4

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments