MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b2f1ddba07f4daac1dc624706048ee3e8939e9b48771ec821d5b85a5f7e10c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5b2f1ddba07f4daac1dc624706048ee3e8939e9b48771ec821d5b85a5f7e10c6
SHA3-384 hash: c3160a79b0251591096ac31e0c1efbb4ba5b50479e0868321f1a5ff014c3eaa375526b7ea9bcc8d3fb8dd1141b72e29a
SHA1 hash: 4858876fe2f063f76967c3db7e64a17255a6f645
MD5 hash: 40712159728484961a4877b7aebcf9c4
humanhash: mike-grey-nebraska-triple
File name:CTM MV ZENKEN MARU.zip
Download: download sample
Signature AgentTesla
File size:631'936 bytes
First seen:2021-02-03 06:19:45 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:nXCh713tYKP5wktZFafGnpVaXcwjLRxb9sBVu/GcGZ1U+0psSrz:XCV13+KPmEbafmpofbCP0GtzU+0psSrz
TLSH 69D423F503675798A7AC0671C381326378B4FFB1AF6E67AB85CD0B6B040B6D240F1669
Reporter cocaman
Tags:AgentTesla zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Deputy General Manager <hsdpark@kymar.co.kr>" (likely spoofed)
Received: "from kymar.co.kr (unknown [103.141.138.126]) "
Date: "02 Feb 2021 17:45:54 -0800"
Subject: "MV ZENKEN MARU-CTM (cash to master)"
Attachment: "CTM MV ZENKEN MARU.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-02-03 06:20:08 UTC
File Type:
Binary (Archive)
Extracted files:
19
AV detection:
12 of 45 (26.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 5b2f1ddba07f4daac1dc624706048ee3e8939e9b48771ec821d5b85a5f7e10c6

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments