MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42f83aaf3849cd4015aaf1cd690692c4f3bf0072d2e892c16a821ba983d9a656. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 42f83aaf3849cd4015aaf1cd690692c4f3bf0072d2e892c16a821ba983d9a656
SHA3-384 hash: 61274d68f6f969e79eeda97e9d9b8f207c5780c828763e00bc06d4a6849bb9c6f193b484bff7d8b4dc8a2f5203e48228
SHA1 hash: bda35274e46d873fefd4be0f51a0649551305a34
MD5 hash: b92d56a05dc8c56dc22d64168e146079
humanhash: stairway-robert-grey-virginia
File name:PAYMENT INVOICE-9876543456789.zip
Download: download sample
Signature AgentTesla
File size:528'275 bytes
First seen:2021-02-19 19:55:33 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:lMI79tODF0rxHwb/b85dVT1t2XnxyVL0I4yjdiSrD0:lMEOexHwb/wCXxS4yjoUD0
TLSH DAB423FCC36DDB243360C26F5675876322FCDA63479838A813B2214697F21A8E51DA5F
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-19 14:09:24 UTC
AV detection:
10 of 47 (21.28%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 42f83aaf3849cd4015aaf1cd690692c4f3bf0072d2e892c16a821ba983d9a656

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments