MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f28bb816fd8e5dd101f1815d96f19f4f87a8bec5601c07f5dedd66ade17b6d3b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: f28bb816fd8e5dd101f1815d96f19f4f87a8bec5601c07f5dedd66ade17b6d3b
SHA3-384 hash: bcb675813c051d773f905db481305543130e102d8f50a4fe1299a5ff957ec5a32737699f80d5179b827b6e2f76655079
SHA1 hash: b4653b4e6c55378775ca02a3e8a7e68f196c15f3
MD5 hash: a6c5bc3b149a0cf33b3399e5dc957b52
humanhash: cola-nine-ten-alpha
File name:payment.zip
Download: download sample
Signature AgentTesla
File size:653'487 bytes
First seen:2023-12-17 20:06:30 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:fMIA+IkkhWtcmmhrabp1LeYYYTrj4f7ZIVK5VmXL2u+opXYCzd6ykjkynUvQgfID:0QILhIFeabrLeYxrEf7Z1a2ixAjrQ0MW
TLSH T184D4232464CF6DD95DF4E35B2EA133273A8CD9AA81DC751AF3230B82D0691D393B5388
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:AgentTesla payment zip


Avatar
cocaman
Malicious email (T1566.001)
From: ""jose.ramirez"<jose.ramirez@expeditors.com>" (likely spoofed)
Received: "from expeditors.com (unknown [91.92.243.208]) "
Date: "17 Dec 2023 06:28:43 -0800"
Subject: "payment slip"
Attachment: "payment.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
202
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:payment.exe
File size:866'304 bytes
SHA256 hash: 2743ed82252fc5c06c1696d961a2fd9ec7e1a49f085b08f6d88ec554707d9e0c
MD5 hash: 7a3bb6d3030ff7c165543f0c687011dc
MIME type:application/x-dosexec
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-17 10:06:13 UTC
File Type:
Binary (Archive)
Extracted files:
8
AV detection:
19 of 37 (51.35%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip f28bb816fd8e5dd101f1815d96f19f4f87a8bec5601c07f5dedd66ade17b6d3b

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments