MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0c55380c202d579673ace8ea1129e110c0caa972af385ceed1c98d1c3164927c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 0c55380c202d579673ace8ea1129e110c0caa972af385ceed1c98d1c3164927c |
|---|---|
| SHA3-384 hash: | 5eb28da0de560a3cbd908d43aa587c3fd56c8d0293105e538fd6173689118335ae88f9e86975f2e6376429ecdabb9878 |
| SHA1 hash: | f74513efb4202df6b4b7ae2959f25e9fd373bac1 |
| MD5 hash: | a516749e8278297864bb616cf700110b |
| humanhash: | october-berlin-white-delta |
| File name: | RFQ#O4O22020_pdf.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 272'246 bytes |
| First seen: | 2020-05-19 04:47:16 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:tCF3Z7zar7zCaqWK0lhWp8/qA1+2upM4NLhXF8Ffkvj:tCRZfarvCaqXp8/qAg2sM4N918xkvj |
| TLSH | EE4423A1632290BEE9F24D3805C9E4C291BF7587E1F4A0051DA1DFFC7E16AB9520BD8C |
| Reporter | |
| Tags: | AgentTesla gz |
cocaman
Malicious emailFrom: "ROKONMA (S) PTE" <azlina@rokonma.com.my>
Received: from nipponrika.jp (133-18-3-102.server.willnet.ad.jp [133.18.3.102])
Date: Tue, 19 May 2020 00:19:14 +0100
Subject: INQUIRY FOR PRICE LIST.....RFQ#04022020!!!
Attachment: RFQ#O4O22020_pdf.gz
Intelligence
File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Genkryptik
Status:
Malicious
First seen:
2020-05-19 05:35:53 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
19 of 48 (39.58%)
Threat level:
2/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.