MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e03b5dabcbcc2bb1086dda3357f5c27ddd4de6a7cd4c85a4b0b85a5ee6fc9f0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e03b5dabcbcc2bb1086dda3357f5c27ddd4de6a7cd4c85a4b0b85a5ee6fc9f0e
SHA3-384 hash: 0e6443dae9cb1242619a0c47a3ad5bdb2661d08394340b6309e982fda4a48811558bd3ebc9710652edffb5462c1db005
SHA1 hash: b6415424f5eecce8267559247eb64d5847cf0f85
MD5 hash: ac290a6b06397cb40d1c7cb64379d345
humanhash: pizza-monkey-kilo-may
File name:factura y datos bancarios.PDF.gz
Download: download sample
Signature AgentTesla
File size:481'166 bytes
First seen:2021-04-08 05:38:45 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:Q6e2XulF7eeOU5tXk1hIGEyPXY8JB/LMAZnyYoUM:QTZT7ei5tXMhItyPLnLoZ
TLSH 40A42303C676D94BF11F3727493E429296BE756C3F384D9B993A30AA3767A4CC396201
Reporter cocaman
Tags:gz


Avatar
cocaman
Malicious email (T1566.001)
From: "ANTONIO ARROYO <antonio.arroyo@corcimex.com>" (likely spoofed)
Received: "from diossa.com.mx (u21557617.onlinehome-server.com [198.251.79.161]) "
Date: "Wed, 07 Apr 2021 14:58:03 -0700"
Subject: "RE: pago vencido de febrero y marzo#"
Attachment: "factura y datos bancarios.PDF.gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-08 03:02:45 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
8 of 48 (16.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz e03b5dabcbcc2bb1086dda3357f5c27ddd4de6a7cd4c85a4b0b85a5ee6fc9f0e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments