MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a32f61907554c422bb96e788daa68d8bcc3b15067fe8d015a0d149f36841d2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7a32f61907554c422bb96e788daa68d8bcc3b15067fe8d015a0d149f36841d2b
SHA3-384 hash: cc87ef43c1a4221945cef3ba02975498862f26e3334fbc0583c8b5cc80fbe5917d4b9c5fb68729071203854b8f61534f
SHA1 hash: de50ec86fa43e09bcd70ad87ef3ad3986afeb013
MD5 hash: fca965622c18dca8f2d29cba484bd90f
humanhash: xray-beer-minnesota-hamper
File name:DHL INVOICE.zip
Download: download sample
Signature AgentTesla
File size:521'691 bytes
First seen:2021-03-09 22:37:43 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:3mk/a0ebvfwknH+BDLt1ll+PxnSxJxoQNA4B5NOsyWl1E:3mkSN3FeTr0xwJxoQNA4laWl6
TLSH E7B423F1ACA4E58BF1F754F889A22BA1620F74A765760871DD4270FC17D2E9BB8004A7
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-09 22:38:06 UTC
AV detection:
16 of 47 (34.04%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 7a32f61907554c422bb96e788daa68d8bcc3b15067fe8d015a0d149f36841d2b

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments