MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 140411a973b9d725fb8677c12e61245d1d1cc9d740644ca5071bab47659dfb04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 140411a973b9d725fb8677c12e61245d1d1cc9d740644ca5071bab47659dfb04
SHA3-384 hash: 6ecb850a751b445a88132fc3825ec4833c9989e5faf8c0b9f21ff90f1ab4389313d2b3f67df6b565dae78c525ca6f0d1
SHA1 hash: 6b2befc6776ed06cd439e42f97f9dd259bd7d25a
MD5 hash: a9f7d345e753d8db4e79c2d58279860e
humanhash: mockingbird-yellow-spring-winter
File name:4090850000.PDF.GZ
Download: download sample
Signature AgentTesla
File size:279'135 bytes
First seen:2021-03-26 06:43:59 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:lEtgxUAGaR9gPAeOymeZKzOEHmR3n69AryVYBPJ1:fxUATR9gPAeOymqSI69AJBPX
TLSH 5A542376286FE148CF1142DE7A9CE05379910E6F8836C86C19B8CF7B95F56818C732DA
Reporter cocaman
Tags:gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Sales@bigeastequipment.com" (likely spoofed)
Received: "from hosted-by.rootlayer.net (unknown [45.137.22.107]) "
Date: "26 Mar 2021 03:28:24 -0700"
Subject: "=?UTF-8?B?5o6h6LO8IOioguWWriAvIOeZvOelqA==?="
Attachment: "4090850000.PDF.GZ"

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-03-26 02:48:25 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
9 of 47 (19.15%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 140411a973b9d725fb8677c12e61245d1d1cc9d740644ca5071bab47659dfb04

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments