MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1105adf05914ea4f0cdec352dc7a46d56a22fda8f364d8f05c1dbd3a66756de0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 1105adf05914ea4f0cdec352dc7a46d56a22fda8f364d8f05c1dbd3a66756de0 |
|---|---|
| SHA3-384 hash: | f1624ab82ad06d19444ff7408ee0e87a02cc4ec5238802b293b1608d43da87ba15108a18bbcb1f7dab960750cce6710f |
| SHA1 hash: | 54a9e2fc7658096c9d36837e685b7ea5cc07f3d4 |
| MD5 hash: | de8d50110551377ed658496f78deccd9 |
| humanhash: | october-lamp-ohio-hamper |
| File name: | Swift copy_pdf.cab |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 430'825 bytes |
| First seen: | 2020-07-21 06:40:04 UTC |
| Last seen: | Never |
| File type: | cab |
| MIME type: | application/vnd.ms-cab-compressed |
| ssdeep | 6144:/+4qkPRmPi1qrEfE8fmNwecJfrzcleuyzxW0dFQ/EBJWktFE0wKzgVFMk6HFyQQ:vqk5ki7E0mNkfrgeTz80dFiE2gnwKsL |
| TLSH | 619423333CCFA627EA767E658C9114351EB3C0B515C380C2985FDC3AA67A592CA8DBC1 |
| Reporter | |
| Tags: | AgentTesla cab |
abuse_ch
Malspam distributing AgentTesla:HELO: mail0.712.gillonuminno.ml
Sending IP: 46.101.121.153
From: Accounts Dept. <noreply@712.gillonuminno.ml>
Subject: Fwd: Re: Payment Advice 21/07/2020- Advice Ref:[SWFA31093538] / ACH credits / Customer Ref:[HX985310810741] / Second Party Ref:[24]
Attachment: Swift copy_pdf.cab (contains "Swift copy_pdf.exe")
AgentTesla SMTP exfil server:
smtp.elittacop.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-21 06:41:07 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.