MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56d2b240bb23e942e2eb57f3a9897f7db48414e89f49c1c65681237c75f6e030. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 56d2b240bb23e942e2eb57f3a9897f7db48414e89f49c1c65681237c75f6e030
SHA3-384 hash: 030ad274bdb1a5656cac3ff95e44533f29e1c7caa1e60b7416e0ef890132b26782bc379e4580095060eafcad76819b65
SHA1 hash: e21b0fad5d15aaedc140889fe92e03d479f993e8
MD5 hash: 3228f8649636ff123e4b7ee2e51b4a20
humanhash: finch-mobile-butter-tennessee
File name:DHL_document11022020680908911.doc.zip
Download: download sample
Signature AgentTesla
File size:860'751 bytes
First seen:2020-12-17 07:05:31 UTC
Last seen:2020-12-17 08:36:05 UTC
File type: zip
MIME type:application/zip
ssdeep 24576:slqHwytDGtq7mZeK8Sj2hiG/36RFV1uv/whBi:s4Q0yym4Kr2hiG/36R+wTi
TLSH 1C05336883ABB9BDE372CC6FB7D44B4FDC46003454299B7EA4DC519203B62D63433666
Reporter lowmal3
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-17 07:06:05 UTC
AV detection:
14 of 48 (29.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 56d2b240bb23e942e2eb57f3a9897f7db48414e89f49c1c65681237c75f6e030

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments