MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3468cda4f6d72b10b55f969fbbc5633ffe6bbbc3615c7d529093929f05d5a3a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 3468cda4f6d72b10b55f969fbbc5633ffe6bbbc3615c7d529093929f05d5a3a5
SHA3-384 hash: b19547d4b44f28b838a52b98574e530730303b00285e471c6cade2f63512f4795cbba6a45a84e74dcfdde2f72bdfe3f6
SHA1 hash: d2059223a5c9353d4af3601cfa5cc38098d300eb
MD5 hash: c694533ac15de4338888c4f93e643326
humanhash: dakota-september-zulu-table
File name:11317693065_03162021.zip
Download: download sample
Signature AgentTesla
File size:880'327 bytes
First seen:2021-03-17 12:45:50 UTC
Last seen:2021-03-29 13:35:26 UTC
File type: zip
MIME type:application/zip
ssdeep 24576:AMuA/AWjGK44lhdHQQCMPUIDxCqngywvrLHYF:AMuvWjGK4cjQQESAqnSf+
TLSH 0F15335FF32E16B6FC132A6BE5EA0B50A337682447F6614331C6A24B763D5D093B185C
Reporter cocaman
Tags:AgentTesla zip


Avatar
cocaman
Malicious email (T1566.001)
From: "rishav.pokharel@pkf.com.np" (likely spoofed)
Received: "from pkf.com.np (unknown [185.222.57.157]) "
Date: "17 Mar 2021 05:44:06 -0700"
Subject: "Re: Remittance details against PI"
Attachment: "11317693065_03162021.zip"

Intelligence


File Origin
# of uploads :
4
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2021-03-17 12:45:02 UTC
File Type:
Binary (Archive)
Extracted files:
26
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 3468cda4f6d72b10b55f969fbbc5633ffe6bbbc3615c7d529093929f05d5a3a5

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments