MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 533f383585db380a6443910f3e4ddf9dabc789ed5f949aa0a7da4b1dd2e80cc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 533f383585db380a6443910f3e4ddf9dabc789ed5f949aa0a7da4b1dd2e80cc5
SHA3-384 hash: c03a5e6098c5905f68bdd4f6ea654c008b857cf89aad10fc1ec336fa4f57d99e07f0ec9909a889a198d2d16cc4ddac8a
SHA1 hash: 7e5b260ab2c77c2e7bfd287b4a255983c5c2580e
MD5 hash: ae6c0d6044307de10f6d2cd24c3ada35
humanhash: august-mexico-wolfram-table
File name:Payment.rar
Download: download sample
Signature AgentTesla
File size:48'284 bytes
First seen:2021-03-10 09:35:20 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 768:BKFUe10L7YkawniSA4wT2me+bLlnaX3xL95lw2uJQKC4PAC2PdmX+DJdqwPZnvm:IFU+0LkkaN4lmI3xL9Y2P4wPdmX+DJd6
TLSH A423F23EE59059A68E0E939F1D91D29978E213CAEF4E4E518483E45E4103C7EF13B4E6
Reporter abuse_ch
Tags:rar


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: dd27504.kasserver.com
Sending IP: 85.13.146.50
From: Mr.Khim Leang <deregt@deregt-agrar.com>
Reply-To: khimleang@citromail.hu
Subject: Re: credit card Payment
Attachment: Payment.rar (contains "Payment.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Bulz
Status:
Malicious
First seen:
2021-03-10 09:36:10 UTC
AV detection:
13 of 47 (27.66%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 533f383585db380a6443910f3e4ddf9dabc789ed5f949aa0a7da4b1dd2e80cc5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments