MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 01327cbb9dcf2149ac4663afe116fb816179c395a2ea44a26b6bf67fb2bd27fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 01327cbb9dcf2149ac4663afe116fb816179c395a2ea44a26b6bf67fb2bd27fb |
|---|---|
| SHA3-384 hash: | db3c87a520e4e7feeb5015f594a86f3330d724910f7c0e0134f15d667aae54583b9e83472d6145a678b6bec0ec2cbc8b |
| SHA1 hash: | 428202ad77cc5df9c78d493fb36a8dd5ff9e1428 |
| MD5 hash: | dc96b237dc5b2265e3b426254123f165 |
| humanhash: | solar-papa-timing-harry |
| File name: | Shandong CIRS Form.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 415'166 bytes |
| First seen: | 2021-04-05 06:25:42 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:CBCRv8S8sEbwBRLVkGLBvdwglGWTRGqFP246XGlem:FKwB5VtNTRGyQXGlem |
| TLSH | 7D9423A77A61B7899466880A6DE28C9DD35BEC7C4F62410CD502B2E7F5348342E9FB0D |
| Reporter | |
| Tags: | AgentTesla rar |
cocaman
Malicious email (T1566.001)From: "shelmest@emirates.net.ae" (likely spoofed)
Received: "from richmondchase.co.uk (unknown [203.159.80.189]) "
Date: "4 Apr 2021 18:42:28 -0700"
Subject: "RE: RFQ SHIPMENT"
Attachment: "Shandong CIRS Form.rar"
Intelligence
File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Taskun
Status:
Malicious
First seen:
2021-04-05 04:30:25 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
9 of 47 (19.15%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.