MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4296697959c29748bd45b4bace9010984bf48bbb20c496776e34da666c4582e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 4296697959c29748bd45b4bace9010984bf48bbb20c496776e34da666c4582e7
SHA3-384 hash: f568425895d33a2d67b495839547afafbbe0e399d8fbfeff349e9ded6e531d884071fc57c183bc671a1182c96e889214
SHA1 hash: 7bb6f3d2ba1f621a69706f302c38cfa3577e9299
MD5 hash: 5e6392f3fe6c1a557e3ab79572432479
humanhash: magnesium-cardinal-mike-oxygen
File name:PO 839039 - FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER8.7z
Download: download sample
Signature AgentTesla
File size:450'595 bytes
First seen:2020-04-05 09:14:50 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:QMpGUoI2tA7f6Z3ImBZwZGWxALoVth5H6v:QM3V2tAL6FBMhm0A
TLSH EAA4235AC391D1A6BE771F12376E65339C13D7DCAD7A3A7C48C3DFA64D202818360AA4
Reporter abuse_ch
Tags:7z AgentTesla COVID-19


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: h55.sserv.ru
Sending IP: 95.215.177.133
From: ITALIA SEPA <vladimir@naksealing.ru>
Subject: URGENT COVID-19 ORDER ITIALIA SEPA
Attachment: PO 839039 - FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER8.7z (contains "PO 839039 - FOR ITALIA SEPA PRODUCZION URGENT COVID-19 ORDER8.exe")

AgentTesla FTP exfil server:
ftp.fox8live.com:21 (207.191.38.36)

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Genkryptik
Status:
Malicious
First seen:
2020-04-05 09:35:47 UTC
File Type:
Binary (Archive)
Extracted files:
18
AV detection:
20 of 31 (64.52%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 4296697959c29748bd45b4bace9010984bf48bbb20c496776e34da666c4582e7

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments