MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fdce51c72a6bce61dbc902c90d3c69713f693cc4a6ac7f290a75a14b9804160b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: fdce51c72a6bce61dbc902c90d3c69713f693cc4a6ac7f290a75a14b9804160b
SHA3-384 hash: 9176846a3624ef5e1c675e193e047b097d0a372780f8c80610a22b4c7441bad33bf6fe920d85ee0af4b94db70e9b8548
SHA1 hash: 5c5c483a24807afdc1c58d9e114fab5d512e0249
MD5 hash: 4e710988ac93a8d7bc9c75f6fc366bfc
humanhash: football-virginia-west-berlin
File name:PAYMENT DETAILS.zip
Download: download sample
Signature AgentTesla
File size:314'304 bytes
First seen:2021-02-05 06:08:30 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:3PZ5AIc5sTBzceVRipt8jClw/uz5uj3jTst6lh7FCoNzFd1ki:3PZ58sRJPiDct/moT8kRd1ki
TLSH B76423E128F7FE464BFE3A8331D0DCCA289A5B252B7C517D96ECE0186228DD4574C4B8
Reporter cocaman
Tags:AgentTesla zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Savita <accounts2@nobleshipping.net>" (likely spoofed)
Received: "from air.nseasy.com (air.nseasy.com [64.37.52.73]) "
Date: "Thu, 04 Feb 2021 19:57:48 -0500"
Subject: "PAYMENT DETAILS."
Attachment: "PAYMENT DETAILS.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-05 06:09:04 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip fdce51c72a6bce61dbc902c90d3c69713f693cc4a6ac7f290a75a14b9804160b

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments