MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 febf83bff0b88c1d297d6ef079338d1f6253641d7b9afc9b553f3477b4bad561. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: febf83bff0b88c1d297d6ef079338d1f6253641d7b9afc9b553f3477b4bad561
SHA3-384 hash: 51057b7ed74444b7e49a9f7247ce3a28658eb084cd9273a876c9c766664b9a8ae8c54115b31248e5160fdaf29aa1064b
SHA1 hash: 1c0aec2e814b74a099c6ce2c75ba7cddd8c9bfc4
MD5 hash: 8b7ff15ff5c8b169f774fa85f29290ff
humanhash: one-batman-solar-moon
File name:STATEMENT OF ACCOUNT.7z
Download: download sample
Signature AgentTesla
File size:29'345 bytes
First seen:2020-10-21 10:10:59 UTC
Last seen:Never
File type: 7z
MIME type:application/x-rar
ssdeep 768:2qKfBjsBG542MZVw9ftdy2O8NpNuUZyU6:2q6554dZYHy2HNHlZB6
TLSH 4DD2E101864984400776CA4F7E77A3CAE3D07CBE284EE800AEF1B267FD5368D60E517A
Reporter abuse_ch
Tags:7z AgentTesla Endurance


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: gproxy7-pub.mail.unifiedlayer.com
Sending IP: 70.40.196.235
From: saji@alajwaa.ae
Subject: STATEMENT OF ACCOUNT
Attachment: STATEMENT OF ACCOUNT.7z (contains "STATEMENT OF ACCOUNT.bat")

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2020-10-21 09:36:45 UTC
AV detection:
19 of 48 (39.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z febf83bff0b88c1d297d6ef079338d1f6253641d7b9afc9b553f3477b4bad561

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments