MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 86c0efffb98c554dfefd3b5b53759c9205a5ce5612ca89ee822b801882ee9f38. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 86c0efffb98c554dfefd3b5b53759c9205a5ce5612ca89ee822b801882ee9f38
SHA3-384 hash: 9cefe752a5960108a33d5e16fb96e07bc093e58f59e23e97e3f4d72b3f43a6b18e11915772a8de0fb04e6af7897f6b04
SHA1 hash: 85725ede536f977dce80395ea5fa74a9bad9c13e
MD5 hash: 21ab2ac2ad94d3efb18cf32f74245361
humanhash: lithium-football-may-wyoming
File name:Wrong_Invoice.7z
Download: download sample
Signature AgentTesla
File size:439'171 bytes
First seen:2021-03-29 15:01:02 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:hzTmPblKFrl3kRSR/ZFfVmCxLM1Huyg3Rb8WOj:4PUNTXYuvdfOj
TLSH 909423490F444162F76FA3BF12E294E8A599C1C2893D5EAD591C877DA7332CC1E2E24F
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-11 02:15:17 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 86c0efffb98c554dfefd3b5b53759c9205a5ce5612ca89ee822b801882ee9f38

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments