MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7195e33b097a9a055de4cf904eeab4d4c2ea2b55fcd270f28f63ddc63c9839f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 7195e33b097a9a055de4cf904eeab4d4c2ea2b55fcd270f28f63ddc63c9839f8
SHA3-384 hash: a23eb757e4fe02fb434723e1f5bdbd88b20c3843d78eed550bd80f6c0c17e921d91c86264876913368be779e663554d7
SHA1 hash: ae69fce31dd6b011c93fc8adf4b04e71fcbf58a9
MD5 hash: b687bc845dfb3f9e69c93d95f3b45dc5
humanhash: spaghetti-carpet-wyoming-montana
File name:PAYMENT-INV-000012.MT103.XZ
Download: download sample
Signature AgentTesla
File size:347'016 bytes
First seen:2020-11-02 09:21:30 UTC
Last seen:Never
File type: xz
MIME type:application/x-rar
ssdeep 6144:FVFTyNYPl03xr7pidwJje/atEldbI1ubP0ULPnMhC4Y:DUeEfpe19lq1ubnrn6Y
TLSH 517423179BDE2C68BB45CFFA6FDF7340F5A7669946668A75CC1B003FD0230622B58482
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-11-01 21:51:17 UTC
AV detection:
8 of 48 (16.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

xz 7195e33b097a9a055de4cf904eeab4d4c2ea2b55fcd270f28f63ddc63c9839f8

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments