MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e78f6147264f80b93ec7a4323cf8996d8dfb1c30583b5dfc8554c5bfc253c60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 4e78f6147264f80b93ec7a4323cf8996d8dfb1c30583b5dfc8554c5bfc253c60
SHA3-384 hash: 3c41e51e1fa56d807f7f356fce84a9a9e557cc82e6cf3d1e8c249144118cc52b16489ec9d7856dcbacaff72b2f4b0d9c
SHA1 hash: 4c58e1d89b0c6b41a217f28701544a2c1d4b4f92
MD5 hash: c89e6cbb3d5a6e7ebbcc4531bbb637f7
humanhash: delaware-quebec-network-avocado
File name:Invoice.pdf.7z
Download: download sample
Signature AgentTesla
File size:550'667 bytes
First seen:2020-08-31 08:27:32 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:eko+aRiuoI7RGS5HX1Yi5CG6GI1Ik0w5rnd13OaZ2+f:SwO8S5HFzCG9IH55R13Oa1f
TLSH E0C423CA8D1A7ECF7B7E8570CFBAE162891AB7BF459B3618438D03985C4303D9584632
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: gyp.gr
Sending IP: 46.227.62.27
From: DH CHONG <info@dorringolab.com>
Subject: Invoice Re-Confirmation
Attachment: Invoice.pdf.7z (contains "Invoice.pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-31 02:13:45 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 4e78f6147264f80b93ec7a4323cf8996d8dfb1c30583b5dfc8554c5bfc253c60

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments