MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8cee477df4cee5ca2d25298456f38795d99c3f427c67a0f828ebe3a40edc58ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 8cee477df4cee5ca2d25298456f38795d99c3f427c67a0f828ebe3a40edc58ac
SHA3-384 hash: 8c5246fafa54b5de077c4749d66fc55b01c23156d01e08fafecc4cf8e2fadc12dc3364ae639095e820b1fb520ca43156
SHA1 hash: cad317dff96f0f09e4ea2349585084b5261eabc7
MD5 hash: dffc88ab14a04257aa8e68e7ef745fd5
humanhash: fourteen-batman-lithium-ohio
File name:attachments.zip
Download: download sample
Signature AgentTesla
File size:1'014'688 bytes
First seen:2020-04-30 13:18:54 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:6bXhD9XDSrmAyFV3V9ZDdLdBwXu2GHutxFfBnYSa/Kp1TjEze47M66:ERDJDGmp3VH2XuxMFYt/aaze47r6
TLSH F025334769A032D582F09CCEED368DD07A1E0AC89C5C9BC81F13BA7559913F6FC91A72
Reporter cocaman
Tags:zip


Avatar
cocaman
Malicious email
From: wongg<daisy.wongg@apclogistics.com>
Received: from apclogistics.com (unknown [103.89.89.197])
Date: 30 Apr 2020 06:11:40 -0700
Subject: Bank Transfer Notification
Attachment: attachments.zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-30 13:35:57 UTC
File Type:
Binary (Archive)
Extracted files:
28
AV detection:
21 of 48 (43.75%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail attachment

Comments