MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 194a723d04acffbdebb0c6f4889932eca3c6871aa81ceeab257dd39e16bd000e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 194a723d04acffbdebb0c6f4889932eca3c6871aa81ceeab257dd39e16bd000e
SHA3-384 hash: 1400e817dbaa6af4252edf164b3f0f69e886aa674ec640f2adb309f26e23ad6f2a7d711eae0127ee85f8a7a646db76b9
SHA1 hash: 6a6d161ef46caff525475a73118ed6eb84349e47
MD5 hash: 22b9d1cd07eac313912bf97800800017
humanhash: winner-oranges-arkansas-pizza
File name:Document4757845845502135324062020_scanned from a xerox device0011.img
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-07-13 11:49:18 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 6144:/C6vTDuu9fAmT14Z+KA9olHHe7/O2yVosGiYTrfe:q6vTyLmp4uWCO2uGPrfe
TLSH 4145CFC1D18D4DD9FC1627B69C37AE22D117BE6A90715A2E225FB434ABB32831037D1B
Reporter abuse_ch
Tags:AgentTesla img


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: server.taci.com.my
Sending IP: 139.99.123.14
From: Toyo Engineering & Construction Sdn. Bhd <nmw_ikram@toyo-eng.com>
Reply-To: Nur Muhamad Wal Ikram Bin Abu Bakar <nmw_ikram@gmail.com>
Subject: [PR259 BIO-MEG] AYBF001 Hot Oil Heater / RFQ / Toyo Engineering & Construction Sdn. Bhd
Attachment: Document4757845845502135324062020_scanned from a xerox device0011.img (contains "Document4757845845502135324062020_scanned from a xerox device0011.exe")

AgentTesla SMTP exfil server:
smtp.flowtech-eng.net:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-13 11:51:07 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

img 194a723d04acffbdebb0c6f4889932eca3c6871aa81ceeab257dd39e16bd000e

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments