MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2049f6d085bab27a4013ed7832b1d8ff486d578f94dc9d3586be96f0b4596578. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2049f6d085bab27a4013ed7832b1d8ff486d578f94dc9d3586be96f0b4596578
SHA3-384 hash: f95b0ff5947421441b7f52402bfa31a95772bdd3018e0e6c0cbe809e607d76c48620751461a0e7f09fe56fc454b3ee84
SHA1 hash: 828c4173ae1f7a693253e29dc982acc38ad289cf
MD5 hash: 7ca105d8d4f24716311eaa03df83736b
humanhash: red-illinois-butter-pennsylvania
File name:Bank letter.7z
Download: download sample
Signature AgentTesla
File size:651'507 bytes
First seen:2020-08-04 13:37:52 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:5ge9yDX9yaxQzWemrmKvGln7sc0z3KE1pcRayljn3:sXAaxfedKvGlIc0zao0lFn3
TLSH 6CD423F3C237746D179827B49E58A6BD8588903380AB2459CEC32173094EDFC9F4BD9A
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: srv.idxdnszone107.com
Sending IP: 54.36.51.187
From: Elena Liu <jreed@worldrunsevents.com>
Subject: REMITTANCE BANK LETTER
Attachment: Bank letter.7z (contains "Bank letter.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-04 13:39:06 UTC
AV detection:
9 of 48 (18.75%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 2049f6d085bab27a4013ed7832b1d8ff486d578f94dc9d3586be96f0b4596578

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments