MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b758c828b331e2fb671e641e1f9e9572b830cd80faca55c8467ca9fbc845b23. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 6b758c828b331e2fb671e641e1f9e9572b830cd80faca55c8467ca9fbc845b23
SHA3-384 hash: f6b794f683e2f6040dabeaad99af3310bb7c21842bb2c64593dd7f2f0b08630c9d981d43d514266b02670b2375a39f5e
SHA1 hash: 851dda6f54822c45107637945575a48b1a008978
MD5 hash: 3f7f0a47f5cd2ac7841fb92bc0f3f0bb
humanhash: network-single-chicken-winner
File name:Swift copy.zip
Download: download sample
Signature AgentTesla
File size:536'414 bytes
First seen:2021-02-18 03:51:43 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:K46pAmTr24K6c/dBB5PaeH6BsnGfVilODsIhqwPUl:VzmW4IlNyeazIODs6dM
TLSH 1CB4232DDA457ACA46B09B0EC4FC401BBB06505CC647E9E11A3FE85472DBF6179DCE82
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-17 22:05:31 UTC
AV detection:
22 of 48 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 6b758c828b331e2fb671e641e1f9e9572b830cd80faca55c8467ca9fbc845b23

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments