MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c7a47519365d9b863185f3fad11c1abf6d24dac0481301e85095fdc9caa37f28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | c7a47519365d9b863185f3fad11c1abf6d24dac0481301e85095fdc9caa37f28 |
|---|---|
| SHA3-384 hash: | 18f7edb12a7427c3b784e89770f6983bb88db554739153a10516f2902438c261d719adf992ab32e2eb144f3e80ce5753 |
| SHA1 hash: | ac21c53605659ce8f43bbaf8141c03b11d1277e7 |
| MD5 hash: | 59519c26dbc070e6aa5865f5236c761c |
| humanhash: | lima-stream-triple-south |
| File name: | Port Inquiry 34009294342.xls.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 131'775 bytes |
| First seen: | 2020-09-24 12:25:36 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 3072:qfjaZmsTOA6kCrcEHyovd72F+UkAiz34yIQqc8JWaX:qLaZ7TN68ovdC13izmQw7X |
| TLSH | 32D31213EAF756FC915243227C6F9D6B2B008234A217A29B5FC3C856FB646211C7DD0B |
| Reporter | |
| Tags: | AgentTesla zip |
cocaman
Malicious email (T1566.001)From: ""JHSHIP|OPS"<cus9@jhship.com.cn>"
Received: "from jhship.com.cn (unknown [88.218.16.246]) "
Date: "24 Sep 2020 14:22:39 +0200"
Subject: "m/v Pravik | PDA request"
Attachment: "Port Inquiry 34009294342.xls.zip"
Intelligence
File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Infostealer.Agensla
Status:
Malicious
First seen:
2020-09-24 05:39:40 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
23 of 29 (79.31%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.