MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5bc36bac58d13e2584d5390cf6e7c05e89018a6fe83476de6488dbb6b05be014. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 5bc36bac58d13e2584d5390cf6e7c05e89018a6fe83476de6488dbb6b05be014
SHA3-384 hash: bab4228503de02fd6bab246ff3590c78383fa39ec3c1e275d9d23f73aaee80cce7b683f02bdeadfe7658eebc6e9055da
SHA1 hash: 0cf754231cd857fe24c09d466a3868e39bf8e752
MD5 hash: 47e6ec015e69186ffa86cb96100975b2
humanhash: sodium-venus-bluebird-north
File name:Cotización de productos anti COVID-19..........pdf.7z
Download: download sample
Signature AgentTesla
File size:424'564 bytes
First seen:2020-04-17 09:41:36 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:zITs7fX2aG3J6ErRrA3F2wn+e9O5QJLYsLA:UTKX2+My+e0KisLA
TLSH BB942385CBC4B873F7A2A9F5DD99A0ACFD5C3A183B4900EB0CBC646556DA04AB1D3743
Reporter abuse_ch
Tags:7z AgentTesla COVID-19


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: mvegypt-server1.mvegypt.com
Sending IP: 64.235.40.5
From: marketing@medicaldimegar.com.mx
Subject: Presupuesto para productos Anti COVID-19
Attachment: Cotización de productos anti COVID-19..........pdf.7z (contains "Cotización de productos anti COVID-19..........pdf.exe")

AgentTesla FTP exfil server:
ftp.motocoroneos.gr:21 (93.174.123.235)

AgenTesla FTP exilf user:
offshore@motocoroneos.gr

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Casdet
Status:
Malicious
First seen:
2020-04-17 09:29:56 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
20 of 31 (64.52%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 5bc36bac58d13e2584d5390cf6e7c05e89018a6fe83476de6488dbb6b05be014

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments