MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb3304eb9d1b5355a16b71678a84be9b4f6d6b966dd721e9e0b1371962df4cc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cb3304eb9d1b5355a16b71678a84be9b4f6d6b966dd721e9e0b1371962df4cc6
SHA3-384 hash: 5f17b378c7bdc6f6aecba646b5f61899420d7a41e4157cb4f74c4942cee8fa93642a05ea80285ab63f822719b1f643be
SHA1 hash: 37b43d715d8e9eb7ef9216b0a2cbfc921b153913
MD5 hash: c0bb35050cd2127a541742a36c26b850
humanhash: nebraska-winter-pasta-fix
File name:#INQUIRY-ORDER-MYN-24267.zip
Download: download sample
Signature AgentTesla
File size:595'828 bytes
First seen:2020-11-18 06:39:58 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:DNmpp6hOfN6hAdUa4I9wkHMnbhiMdZgRwSfq:DWj16h5aYkHMb6Rji
TLSH E5C423732129D9593E09BE23AC9BF6C270DBD5EE5B8496D3D10B8B629D673603D00C39
Reporter cocaman
Tags:zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Arlo Riley <wgajelonia@cdmlight.com>" (likely spoofed)
Received: "from cdmlight.com (unknown [23.81.246.242]) "
Date: "17 Nov 2020 18:26:09 -0800"
Subject: "Fw: Need pricing for the BOQ material"
Attachment: "#INQUIRY-ORDER-MYN-24267.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-18 02:35:16 UTC
File Type:
Binary (Archive)
Extracted files:
24
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip cb3304eb9d1b5355a16b71678a84be9b4f6d6b966dd721e9e0b1371962df4cc6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments