MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b62f38d60a4f53da440dbccf7c6de49d995260118a36b820fab0d8924108b96d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 3
| SHA256 hash: | b62f38d60a4f53da440dbccf7c6de49d995260118a36b820fab0d8924108b96d |
|---|---|
| SHA3-384 hash: | 9a3dd01dcd9ad0fffae9784514f06b65c57df981488c779a5a8f3da4e9b8f90c8d244917c87201ff1629fc6de27c4e0a |
| SHA1 hash: | 8baeae865280b0e701055497ba4814d87f8a10a7 |
| MD5 hash: | 343f094ae90929caf113e44b872f020e |
| humanhash: | robin-gee-north-nitrogen |
| File name: | INVOICE USA LIST.zip |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 745'243 bytes |
| First seen: | 2020-07-13 05:25:09 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:hAJXhsa4a2+QdyQhkQSmSsgLjGPLD9sVyWKrY1jQpNrB6gW38oVv3t+uEI70:eV1925d7gl+3+yZ818pNcgWsAt+u6 |
| TLSH | CAF423875A83DF33E91639916E0D30F0A7D8DE6A1DE542869D4370F365C7E89E8D8282 |
| Reporter | |
| Tags: | MassLogger zip |
cocaman
Malicious emailFrom: Ariadna Ortiz <info@decentlogistics.com>
Received: from 142-4-22-49.unifiedlayer.com (142-4-22-49.unifiedlayer.com [142.4.22.49])
Date: Sun, 12 Jul 2020 19:15:23 -0600
Subject: INVOICE USA EXPORT SEA SHIPMENT
Attachment: INVOICE USA LIST.zip
Intelligence
File Origin
# of uploads :
1
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-13 05:27:05 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
21 of 48 (43.75%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.