MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 199db33087a7aabeaa3a748dcc82abb6ba00ae68010096783a5431d52ebdf4ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 199db33087a7aabeaa3a748dcc82abb6ba00ae68010096783a5431d52ebdf4ec
SHA3-384 hash: 9de80ea6d77861ab8484dc988fbb1862be597868fd7183b5533b34d1bc5ee0313a4588348c183560817e14d05adb5aff
SHA1 hash: 82af93726cae428f7e20d0b49241b42e0636a80f
MD5 hash: f38030b141c35992d35f790c20cfd3be
humanhash: diet-edward-moon-alabama
File name:PO-789906504.zip
Download: download sample
Signature AgentTesla
File size:582'196 bytes
First seen:2020-12-03 07:02:30 UTC
Last seen:2020-12-03 07:23:24 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:LvZheXXkAVCnkbl8H3C7ts6/K0DX9VVG3jd/JRtjPu22BOGN6GCn:9henkgCnkW3C7txyu5G3jd/pU14
TLSH 7FC423A9F6DD82DF49AF9CD0307A3BA76F7BA9046180A73C414E016C2B425D4C737DA2
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.EmotetAE
Status:
Malicious
First seen:
2020-12-03 01:42:31 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 199db33087a7aabeaa3a748dcc82abb6ba00ae68010096783a5431d52ebdf4ec

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments