MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8eef479306c90f9563f8e56cebb57d2225e511bf7ea6db1bb38adc84793fa12. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a8eef479306c90f9563f8e56cebb57d2225e511bf7ea6db1bb38adc84793fa12
SHA3-384 hash: 77a0bfdc53b39a99b0105fed7c21a1265111cb8dbac06800fd8079777777ed0c6a11a295d9eb9eed9dac85fa56afb22f
SHA1 hash: b956886c4316ac86d31883b2bda76187d90ffb4c
MD5 hash: 453e8379800c03eaeb55e86c096eba1a
humanhash: zebra-failed-winter-ten
File name:我司已匯$23856 (Our remitted $ 23856).zip
Download: download sample
Signature AgentTesla
File size:807'041 bytes
First seen:2021-03-01 07:04:44 UTC
Last seen:2021-03-10 21:18:31 UTC
File type: zip
MIME type:application/zip
ssdeep 24576:Csnhn72MsY1Zb/5ByxVJOtdokkQkLr1+ZQ:lhn742b/5ByxVJQ6nUZQ
TLSH 6605330CFDF9C61A93E2A8115744E2762FC35D4456FF2B632F0B697680811C9CCAADDA
Reporter cocaman
Tags:AgentTesla zip


Avatar
cocaman
Malicious email (T1566.001)
From: "joytime2 <joytime@jtfilter.com.tw>" (likely spoofed)
Received: "from jtfilter.com.tw (unknown [45.137.22.59]) "
Date: "28 Feb 2021 19:17:30 -0800"
Subject: "=?UTF-8?B?5oiR5Y+45bey5YyvJDIzODU2IChPdXIgcmVtaXR0ZWQgJCAyMzg1Nikg?="
Attachment: "我司已匯$23856 (Our remitted $ 23856).zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2021-03-01 02:14:39 UTC
File Type:
Binary (Archive)
Extracted files:
33
AV detection:
7 of 47 (14.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip a8eef479306c90f9563f8e56cebb57d2225e511bf7ea6db1bb38adc84793fa12

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments