MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc311f2845a756c0ff57e94abac7f894e60338ddc08187324154005d45c32456. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: bc311f2845a756c0ff57e94abac7f894e60338ddc08187324154005d45c32456
SHA3-384 hash: c48c7038e0674cde280ca7be57fc17071bfd222c4502d0c90d863ce4eb54ac73fff782566ae7fc5b6d313327966c3600
SHA1 hash: df4cf459adb8072b4d413351b94ed2afba800f92
MD5 hash: d2eb19707d30018ecf87f0d198d72fbd
humanhash: solar-bravo-white-romeo
File name:leylaty-RAK-16.02.2021,pdf.xz
Download: download sample
Signature AgentTesla
File size:679'863 bytes
First seen:2021-02-16 23:31:43 UTC
Last seen:2021-02-17 18:02:42 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:AlwUFxnPNsjoFhnFs7oXwkpvdv9DmfhTkqzG6tYt3NYgUGpWbAHxrGysz5jSgXYC:At/NmoF3s7YwA854qp6t9LUW1Hpg5jtR
TLSH 5DE433B22CE26936D92355D7F89CFBD389B0DED351946CF0E944917DF00A1A41CAACD8
Reporter GovCERT_CH
Tags:AgentTesla

Intelligence


File Origin
# of uploads :
2
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-16 13:45:51 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip bc311f2845a756c0ff57e94abac7f894e60338ddc08187324154005d45c32456

(this sample)

  
Dropped by
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments