MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f1080adbd3d9e82e29b4b913517558e786f842c93a49758ccbaf8df59cf1d22. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7f1080adbd3d9e82e29b4b913517558e786f842c93a49758ccbaf8df59cf1d22
SHA3-384 hash: bacf2f95c6dcc52aaa44a640dcf35e41a796cb4fc7d03e2c2c12570a9ab1c1942d5f70533e007043d85a0cfa7b04e13f
SHA1 hash: d919e3c24acb88e90faa36bb91c79905e65859eb
MD5 hash: 4e28b1afd4cedf412db5cee972531438
humanhash: thirteen-harry-five-wisconsin
File name:PO-047596490_SampleSpecifications,xlsx.7z
Download: download sample
Signature AgentTesla
File size:654'718 bytes
First seen:2021-01-08 08:14:49 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 12288:g7Vr9xs3+TH8JF+pckdGCYOzXRmlya9hXHtgiOKL8cqYm8vHPV5C5TzzULH:gprjs3mQF4LXElnXNgiOKgZYdftk5TPS
TLSH 2BD433E97F394066145CEFF560AE0C8D3B2D98685DA56CF523F20A48F2C9B13247F1A6
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail-smail-vm49.hanmail.net
Sending IP: 203.133.180.237
From: 엄익태 <kjk122803@hanmail.net>
Subject: 答复: New Purchase Order-Inquiry
Attachment: PO-047596490_SampleSpecifications,xlsx.7z (contains "PO-047596490_Sample&Specifications,xlsx.exe")

AgentTesla SMTP exfil server:
mail.wowwow.com.sg:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-01-08 08:15:12 UTC
AV detection:
5 of 46 (10.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 7f1080adbd3d9e82e29b4b913517558e786f842c93a49758ccbaf8df59cf1d22

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments