MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 03aa62a0d4b763411792184c1e0e9bd33fea215613c8a9044512394f592a3484. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 03aa62a0d4b763411792184c1e0e9bd33fea215613c8a9044512394f592a3484 |
|---|---|
| SHA3-384 hash: | 9ebd05983a8a591f91a8581fabdedc2130ff03825a7a845e47ffc4dc2526ee857b577e4b740261389fda273473176dde |
| SHA1 hash: | 0fff4e16d0fe9f40cc287f43ad359d7c2adb1904 |
| MD5 hash: | 4c6fbd12fcd5f3c07f14a6c302f9a490 |
| humanhash: | colorado-michigan-steak-twelve |
| File name: | PO2000254.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 673'493 bytes |
| First seen: | 2020-07-20 08:30:39 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:yDFvuzHMKbG1IlQ5+zwrA3EgIzxlXUnohZG6tr0XEtLa1fn7Sy81oDY:yx2oKbsAsG6zxlXUoHG6oCLSNyl |
| TLSH | C1E433E32AD57FB481160A50ABB43CEE784C7921FDC7A4B152936A1BB7F017A49F1E40 |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: pearltech.com.cn
Sending IP: 95.211.208.50
From: Nur Fattin (Ms.)<sales@pearltech.com.cn>
Reply-To: Nur Fattin (Ms.)<nicolasdiegonicolas@gmail.com>
Subject: RE: PURCHASE ORDER NO.: PO2000254 - HEADSTART TECHNOLOGIES SDN. BHD. - ALLEN BRADLEY
Attachment: PO2000254.gz (contains "PO2000254.exe")
AgentTesla SMTP exfil server:
smtp.bapipl.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
66
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-20 07:08:00 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.