MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4620919f607e9b78453f0b3e2c9459277387000664c39972d344abcb32dea578. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4620919f607e9b78453f0b3e2c9459277387000664c39972d344abcb32dea578
SHA3-384 hash: b5bb210133472324a7c0d2a2ad587d92b8403f58465da2e376c3070689b6185fb4d7eec8e66e3712c566efd2a0716b49
SHA1 hash: 02b3bbaf1341bcb3c4263758544f3b0525168085
MD5 hash: 476b7634ec9de6d41dc5a4152aeb94cf
humanhash: muppet-michigan-sad-single
File name:Documentos de DHL..PDF.....gz
Download: download sample
Signature AgentTesla
File size:505'449 bytes
First seen:2021-04-01 17:42:05 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:2sZ6jogN+aIMcXx8F6UkEm7+6SyeKfjdyDIanBDlclumjx:MjL/NcB8F6Uhm7+AJj0Htlauqx
TLSH 08B423694EFA828C34FC4BC5500C93928A67175EC87622DD643531EFB11CDB37622F99
Reporter cocaman
Tags:AgentTesla DHL gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Gerente de carga de DHL <pagos.fletes@dhl.com>" (likely spoofed)
Received: "from diossa.com.mx (u21557617.onlinehome-server.com [198.251.79.161]) "
Date: "Thu, 01 Apr 2021 04:47:23 -0700"
Subject: "=?UTF-8?Q?Confirmaci=C3=B3n_de_env=C3=ADo_DHL_Express=23?="
Attachment: "Documentos de DHL..PDF.....gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
123
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.GenericML
Status:
Malicious
First seen:
2021-04-01 17:43:06 UTC
File Type:
Binary (Archive)
Extracted files:
30
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz 4620919f607e9b78453f0b3e2c9459277387000664c39972d344abcb32dea578

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments