MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e563d901aa6b667910fdadfe12bd13e3e7e8eab6b1ab78becf18cc906699b2e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 1e563d901aa6b667910fdadfe12bd13e3e7e8eab6b1ab78becf18cc906699b2e
SHA3-384 hash: 2464ce3c5d2e8ff7f076f77e2e8bc1be5557ee8e6f61f433a6b02c9523f4f6a3a696461b63ed09ca39b02b36911d56c8
SHA1 hash: e62418ab2e414b492af760ae41119882050a27a0
MD5 hash: cfaa95194405600fe01e54444582a7f7
humanhash: mexico-sad-cola-mango
File name:ACCOUNT STATEMENT.gz
Download: download sample
Signature AgentTesla
File size:435'042 bytes
First seen:2020-08-05 17:09:37 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:WQT4lhl/BlihDHJ8chwAGEXDn87Jp8oHm:W04vRniRJ8cxGEXK38p
TLSH 3F9423C993A76A11A0C3B30132D7580F27E64B7730B8E49BB56E9678F593D690F78423
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

From: Sajjan Mishra <sajjan@anandnvh.com>
Subject: RE: ACCOUNT STATEMENT
Attachment: ACCOUNT STATEMENT.gz (contains "ACCOUNT STATEMENT.exe")

AgentTesla SMTP exfil server:
smtp.rezuit.pro:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-08-05 17:11:04 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz 1e563d901aa6b667910fdadfe12bd13e3e7e8eab6b1ab78becf18cc906699b2e

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments