MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149c35fb32ab15381632b9a714769cc2c75f05b1615e35d2c90655349c7f234c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 149c35fb32ab15381632b9a714769cc2c75f05b1615e35d2c90655349c7f234c
SHA3-384 hash: 5afca61585d07926f20ca7ce6ffd8ddfcc586163bd3c020e70c5d64d740754d7b07cfbb516da4980e63bf0e4898938e1
SHA1 hash: 38b6980828ac7162e4ab025ef0dc8f1c7360c0c0
MD5 hash: 2b093deb80021ea6d2b666d59ec79ed2
humanhash: west-apart-white-carpet
File name:DHL.DETAILS.TRACKING.PDF.Gz
Download: download sample
Signature AgentTesla
File size:794'367 bytes
First seen:2020-12-23 18:46:49 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:WYx+QwQbREu1yQf3We3VlvoFWIGmWExkiknr4LAiW:LwWqu1TfmclwF3hWExkniW
TLSH B1F433CE853C6D580532CA784DA973018089A716729487EFAF662DF12FCF6D905C3A9F
Reporter abuse_ch
Tags:AgentTesla DHL gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: soulbiketours.com
Sending IP: 193.29.104.246
From: "DHL International GmbH"<javi@soulbiketours.com>
Reply-To: "Agent"<officeme47@yandex.com>
Subject: SHIPPMENT NOTIFICATION URGENTLY NEEDED
Attachment: DHL.DETAILS.TRACKING.PDF.Gz (contains "DHL.DETAILS.TRACKING.PDF.exe")

AgentTesla SMTP exfil server:
web2.changeip.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
765
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-23 18:47:04 UTC
AV detection:
20 of 48 (41.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 149c35fb32ab15381632b9a714769cc2c75f05b1615e35d2c90655349c7f234c

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments