MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52683e6867f648b28ecf69e6607643625c17378f4bb4d250a4e503d0c713a7cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 52683e6867f648b28ecf69e6607643625c17378f4bb4d250a4e503d0c713a7cc
SHA3-384 hash: da1caadcaa400821f8975885401f0992ab716a30f989fadcaff77f6f09dfc185ad6b6e743767487c358498bfb1beeb00
SHA1 hash: 3b485d47be6309ef98364c26e9deec5fd2e5a389
MD5 hash: c2cdc6737802252ad55a7262fa7f3b0c
humanhash: april-wolfram-missouri-crazy
File name:SWIFT.rar
Download: download sample
Signature AgentTesla
File size:582'020 bytes
First seen:2020-11-10 14:35:35 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:rPhuvGA9MfhtajmiishbBpp1mAPIh5sYLCSpz2rTwpO9Cppx:DhuvGasa3LpPmAAh2VbHIO9sv
TLSH 18C423124F568C9C615390B5DD55901076BDDCBB26C30AA2D7D3BF3DBBB88CA278D092
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
193
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.AveMaria
Status:
Malicious
First seen:
2020-11-10 07:41:26 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 52683e6867f648b28ecf69e6607643625c17378f4bb4d250a4e503d0c713a7cc

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments