MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34740a735fad3fd035a940b5e89418d24601de61300b24e2a63efbeaea753628. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 34740a735fad3fd035a940b5e89418d24601de61300b24e2a63efbeaea753628
SHA3-384 hash: ae61e479f7780c69456fe8de7bb6acaa54d2048bf1e8d8fb203168bbba68b14ed0fb2f01ed1fe8d959d01f4bf5a4cc74
SHA1 hash: ddd87b644658147e6b44bfd4f961bfa7444b8c61
MD5 hash: 397fe81d94692d62427bcd7cd36ec81d
humanhash: ceiling-three-angel-arizona
File name:DHL.TRACKING.PDF.2021.Gz
Download: download sample
Signature AgentTesla
File size:518'753 bytes
First seen:2021-03-10 06:31:35 UTC
Last seen:2021-03-11 03:05:29 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:BHqZQCBSyjmp+LPgWWIuHu9NjGn6Hf0tJiaQ6QkQ9FAZ0i:sZQCBSyjmp+zS2Ny6Hf0/iamt9KZ0i
TLSH D1B423D6AC819A329A31EB2957E14257892C11F02EDCC1CE9C0CEE51EECF9716C0D78B
Reporter cocaman
Tags:AgentTesla DHL gz


Avatar
cocaman
Malicious email (T1566.001)
From: ""DHL Express Notification"<smtp-uyk6w@test-amm.thrive-test.bitstoneint.com>" (likely spoofed)
Received: "from [66.154.98.110] (unknown [66.154.98.110]) "
Date: "10 Mar 2021 06:38:08 +0100"
Subject: "DHL Arrival Notification"
Attachment: "DHL.TRACKING.PDF.2021.Gz"

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Taskun
Status:
Malicious
First seen:
2021-03-10 06:00:52 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 34740a735fad3fd035a940b5e89418d24601de61300b24e2a63efbeaea753628

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments