MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 66c620eff690d2fa0c192363cb7a67e04beb9eb1166527fdbe3f0b14eeee15f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 66c620eff690d2fa0c192363cb7a67e04beb9eb1166527fdbe3f0b14eeee15f7
SHA3-384 hash: 18c7d4239e99982de61cca8cbe0eda596c9ab178fbcb5b2bc3fcb526bd592b023efb19b83a6f54d42692283db8d37ac0
SHA1 hash: 0388f452e783f56ecd020053bd275fb5889aa188
MD5 hash: a7561dffe9857d9b7ed0c27034bddc4d
humanhash: carolina-india-chicken-london
File name:Delivery Form C.rar
Download: download sample
Signature AgentTesla
File size:846'581 bytes
First seen:2021-03-25 06:49:52 UTC
Last seen:2021-03-25 07:05:09 UTC
File type: rar
MIME type:application/x-rar
ssdeep 24576:jyWx8eBl5qS9slOL9UzfdPWm6uJDPg8oY:jyW9kOL9Uzfd+mJJD4nY
TLSH 46053326D18BEF1C053B3B14870D587FAE4BAD8D4A81A44A1FBF07A478894874F6F271
Reporter cocaman
Tags:AgentTesla rar


Avatar
cocaman
Malicious email (T1566.001)
From: "freight@china-freight.com" (likely spoofed)
Received: "from fraservalleylions.org (unknown [203.159.80.189]) "
Date: "24 Mar 2021 23:57:29 -0700"
Subject: "RE: RE: module quotation / FCA Changzhou to CH-Romont / Reminder"
Attachment: "Delivery Form C.rar"

Intelligence


File Origin
# of uploads :
2
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-25 06:50:07 UTC
File Type:
Binary (Archive)
Extracted files:
22
AV detection:
16 of 48 (33.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 66c620eff690d2fa0c192363cb7a67e04beb9eb1166527fdbe3f0b14eeee15f7

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments