MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 14f884ef9c54b503ab7bbb407c6e1662e110abeec852d9f7e709730cb840aa56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 14f884ef9c54b503ab7bbb407c6e1662e110abeec852d9f7e709730cb840aa56 |
|---|---|
| SHA3-384 hash: | b6b5577a43cb948bb6404dea020dba513f81484fd10293d2a9918ec951dbacc0d284e821703a51594ed4e34dd27e6654 |
| SHA1 hash: | fb354107c00646553c440e538a32b27536a42818 |
| MD5 hash: | 06fb54b658a5cabe2cf159476e01fa14 |
| humanhash: | wolfram-fourteen-ack-muppet |
| File name: | Image001.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 418'977 bytes |
| First seen: | 2020-07-29 06:31:20 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 6144:cMJTBdTKwG1YoQRyM6Eu4zUHiG4xkPG9/t1zjz2QZltu/2ry6xSdSekKO9ZKLqxk:q1D0NUCoGNjzrtu/GxekKO9yqcIG |
| TLSH | C99423D586860273BE974400BE7102A941398FB1E9288EDEB7C335B716DD2643F479DB |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: delivery.mailspamprotection.com
Sending IP: 146.66.121.217
From: Philippe Lee <philippe.li@midea.com>
Subject: Re: Transfer Confirmation 100241703
Attachment: Image001.gz (contains "Image001.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.DataStealer
Status:
Malicious
First seen:
2020-07-29 06:33:05 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Farheyt
Score:
0.80
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.