MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e8319b60657f5cf0267967a37408e78f37569dea6fe24db2ddb49bb58cb9a04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 4e8319b60657f5cf0267967a37408e78f37569dea6fe24db2ddb49bb58cb9a04
SHA3-384 hash: 6f698f5602973ad18c97f54d8497da11333c9049fd99666988748906ef9f5b276d7c67ccfb8f464fa1396b547b8d0061
SHA1 hash: 8afd75e3ff43064d2cacc05cba27c5bc4cd90217
MD5 hash: 262a1ed87aae9a2d67e4e8ee77af0472
humanhash: arkansas-arizona-music-arkansas
File name:payment notification.exe
Download: download sample
File size:83'680 bytes
First seen:2020-10-13 12:27:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 768:j9NtoMQXep+L/UW0mJ0O45pYxb8b0zlPPUdrnT4K5zEASUl+Uf2hF:Tto3511J0O45Yb8boPCT4K5zEASUUUf8
Threatray 37 similar samples on MalwareBazaar
TLSH B18302A7AD4DF701F87983FA42A3939F8BF452D2D117A5F929B649B05073D08634EA03
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: box.iizvar.com
Sending IP: 45.61.53.254
From: Paymentsemail@fnb.co.za
Subject: Payment Notification
Attachment: payment notification.pdf.z (contains "payment notification.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
.NET source code contains very large strings
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-13 07:44:04 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
4e8319b60657f5cf0267967a37408e78f37569dea6fe24db2ddb49bb58cb9a04
MD5 hash:
262a1ed87aae9a2d67e4e8ee77af0472
SHA1 hash:
8afd75e3ff43064d2cacc05cba27c5bc4cd90217
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 4e8319b60657f5cf0267967a37408e78f37569dea6fe24db2ddb49bb58cb9a04

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments