MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e667a0e768afaf775ab69435c78a55e31ae478c68383cde4c364dfdd05924690. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | e667a0e768afaf775ab69435c78a55e31ae478c68383cde4c364dfdd05924690 |
|---|---|
| SHA3-384 hash: | fa12f2541a8bcda85e4db744aa6ebd6cb6309b7df06c50f8d4d10ec589a8f548360393a98b07659bb46a72df855c5e3e |
| SHA1 hash: | 559ec54ba96ad74e4f9e49751271d365e7e013a0 |
| MD5 hash: | 1b71c250aa941672de002d90e849e110 |
| humanhash: | tango-queen-jersey-two |
| File name: | SWIFT COPY.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 337'523 bytes |
| First seen: | 2020-09-23 09:59:27 UTC |
| Last seen: | 2020-09-23 14:10:16 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:ueZcONCUrNhoWZqTXE2TX0SacRjjIdx7AcVoo5+VdQ7XXmIqwxREJ2pjm:ueNCUrNhdckWIgd/dQLWwxRE+jm |
| TLSH | 117423C919DF7AE35A6ED2FE70485C51F2620C586607AC29D83A6F4EF5E8CB4118C1F2 |
| Reporter | |
| Tags: | AgentTesla SWIFT zip |
cocaman
Malicious email (T1566.001)From: "Anup Kumar Jhode <anupkumar.jhode@pandrol.com>"
Received: "from pandrol.com (unknown [209.58.149.90]) "
Date: "23 Sep 2020 11:45:33 -0700"
Subject: "Swift copy"
Attachment: "SWIFT COPY.zip"
Intelligence
File Origin
# of uploads :
5
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.Ymacco
Status:
Malicious
First seen:
2020-09-23 10:01:10 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
18 of 29 (62.07%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.