MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4901e545f909725ea2329a68aab1875a244404f379a3a66bbc289fc032dab053. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4901e545f909725ea2329a68aab1875a244404f379a3a66bbc289fc032dab053
SHA3-384 hash: 03607c27ea0f30ba26bc1dfd41f82e303c512b0042ea08fe3b670a17f404010086a6b09fef1134e28dd6f1db6491c3e1
SHA1 hash: d9b8d52c23d59ffe04e6df665c47fa639c682725
MD5 hash: f8674c0b7be761d12ace57039b6688fd
humanhash: don-one-magnesium-saturn
File name:TT.7z
Download: download sample
Signature AgentTesla
File size:783'049 bytes
First seen:2020-12-15 08:20:53 UTC
Last seen:2020-12-15 09:18:42 UTC
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:AjicJYqGzdCXypRg4ETTMRreE+OXN6S/jtQa/GpHiqCd3vNiA:AicJDGxRpRHEURreE+snLf/Gcqe3vND
TLSH 1FF423B4EF9812ABFA92F0787DD696701469D059DB21CD1308E64F6672F9F12B0092CF
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
160
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-15 08:21:04 UTC
AV detection:
5 of 48 (10.42%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 4901e545f909725ea2329a68aab1875a244404f379a3a66bbc289fc032dab053

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments