MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 095c96e3ed31e57e568fe28d77c9266d393b8ce2bea8f042cff86bd09a58b9b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 095c96e3ed31e57e568fe28d77c9266d393b8ce2bea8f042cff86bd09a58b9b8 |
|---|---|
| SHA3-384 hash: | 6b5b0da56878c93b0a3c9ca364f44360243b5e07a95942d322735c3c68d29bd2148d6092b577ed22a8e98c74adc31aa0 |
| SHA1 hash: | 45d7ddf57189f3b96178ea2063d806abc335c59d |
| MD5 hash: | cead6a5cc2d63fff9f3f83347aaff5c0 |
| humanhash: | island-fifteen-six-freddie |
| File name: | Bestellnummer 4115272-072020.PDF________.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 357'743 bytes |
| First seen: | 2020-07-24 10:55:01 UTC |
| Last seen: | 2020-07-24 11:30:37 UTC |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:nIO+s8G4QWP8m/kwsBFpRIOGDtbV4qt+nmeV8G26DyrfDPMEM9qXL3c2sl:nINs8GGPY7QtV42+n5VmrfDDb3c24 |
| TLSH | 917423750410021E5596CFCDFD22F74FFE4638B52CB58A5AF1A342EA40941EADE33A2A |
| Reporter | |
| Tags: | AgentTesla DEU geo gz |
abuse_ch
Malspam distributing AgentTesla:HELO: mail.saglikliveguzel.com
Sending IP: 185.48.181.145
From: Marta Burghard <marta.burghard@ims-zeitarbeit.eu>
Subject: Angebotsanfrage (Bestellnummer 4115272-072020)
Attachment: Bestellnummer 4115272-072020.PDF________.gz (contains "Bestellnummer 4115272-072020.PDF________.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-24 10:55:08 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
5 of 48 (10.42%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.75
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.