MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b7fd4fe79e3bef5054410b9289e84e86d8a7e844cf266fbc0d34dbf60fe75c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 5b7fd4fe79e3bef5054410b9289e84e86d8a7e844cf266fbc0d34dbf60fe75c7
SHA3-384 hash: 1ad5b351f1b966a9c33599a24decbf8883f07c6c61bf362ed768556ce00f2adbb1839c9a4f6af3d9600cd563fdf728b4
SHA1 hash: 2dae4a8dbe0c50dbcec76a8cd9493703f3cb08eb
MD5 hash: c45852584b666fd7fb4235143a721b78
humanhash: three-delta-emma-sodium
File name:CI PL 2021 shipment for correction,pdf.zip
Download: download sample
Signature AgentTesla
File size:5'705'416 bytes
First seen:2021-02-24 07:06:56 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:rU9LiFMp8ZFzBSy0cqI1CZItPu7rACpxFmw6UqqYTFHiH3RAgM6cp:I8Z5x0cqIW7bxFmwBxYTAH3RAD6cp
TLSH A44633A0F16BA46B07FE3BCB1550212FBABF5C41408985677D8291C97AAE31275E3F0D
Reporter abuse_ch
Tags:zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: [154.127.53.215]
Sending IP: 154.127.53.215
From: Sara<s.zennaro@omn.it>
Reply-To: bur.staten@bk.ru
Subject: Re: re: Correction
Attachment: CI PL 2021 shipment for correction,pdf.zip (contains "CI & PL 2021 shipment for correction,pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2021-02-24 07:07:20 UTC
AV detection:
6 of 47 (12.77%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 5b7fd4fe79e3bef5054410b9289e84e86d8a7e844cf266fbc0d34dbf60fe75c7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments