MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 69650720ac01252d16535518d52b2128ee46856d4e2fea37193227ff44d3274b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 69650720ac01252d16535518d52b2128ee46856d4e2fea37193227ff44d3274b |
|---|---|
| SHA3-384 hash: | 5a99bd73e01cb602da7fcbf8f42f763e8cf7e0ac6651edd693b2c9946806f2a2949daa40d583ca3a3e537c434aa2ef58 |
| SHA1 hash: | 685055a9fd799e6b1155683afbb7d856c96b8aaf |
| MD5 hash: | d7f29e91bc9f224a37cae399aa4363f6 |
| humanhash: | missouri-zulu-yankee-arizona |
| File name: | Fauur 893454o..img |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 924'602 bytes |
| First seen: | 2021-03-18 06:23:10 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 24576:NsHPoA5Xn7LWMGeOrwvp+38T/Erba6mtRr:SvrXOMdp2I8NS1 |
| TLSH | D71523F37A19461DCC1364E6F9422EAB172B45A165D6CCAD24C0F38B91BFDC08B72D4A |
| Reporter | |
| Tags: | AgentTesla img |
cocaman
Malicious email (T1566.001)From: "Sales@bigeastequipment.com" (likely spoofed)
Received: "from hosted-by.rootlayer.net (unknown [45.137.22.107]) "
Date: "17 Mar 2021 21:51:24 -0700"
Subject: "=?UTF-8?B?5LuY5qy+5Y+R56WoXzg5MzQ1NA==?="
Attachment: "Fauur 893454o..img"
Intelligence
File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Swisyn
Status:
Malicious
First seen:
2021-03-17 20:42:14 UTC
File Type:
Binary (Archive)
Extracted files:
29
AV detection:
37 of 47 (78.72%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.