MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 28350e56a7d21eae81dc7ac3f5016031407d2936703034f3b220393e653cf11f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 28350e56a7d21eae81dc7ac3f5016031407d2936703034f3b220393e653cf11f |
|---|---|
| SHA3-384 hash: | 7043633eab6965a61a4aee8428cabd5fd348a5cd28db497d8a357270b4d76ca101a74a152c912507f31048d1f2d4b9c0 |
| SHA1 hash: | 501cd367cab584d260060cb47c1926fa8ea824ce |
| MD5 hash: | 88125f115267d1fdffe25e3825acb660 |
| humanhash: | magnesium-failed-orange-carpet |
| File name: | Tracking No_SINI0068206497.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 598'868 bytes |
| First seen: | 2020-08-19 14:51:12 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 12288:58uGsy7kS9m6a9LRAAOg6M98UpaIjajG1e5pQgqfLgT4lUNKo+Z6R:lGsy7ksmBLVz6sKmeGcRNKo+cR |
| TLSH | F4D423B9B891DAE1DC5583A8D89668061E3D04B85F748F8DEBE7C37198C839DE48F4D0 |
| Reporter | |
| Tags: | AgentTesla DHL gz |
abuse_ch
Malspam distributing AgentTesla:HELO: xzn0.702.metalvxini.ga
Sending IP: 128.199.16.166
From: "DHL EXPRESS" <info@702.metalvxini.ga>
Reply-To: kelveneric88@gmail.com
Subject: DHL PO1001910 Sample Arrive : Tracking No_SINI0068206497
Attachment: Tracking No_SINI0068206497.gz (contains "Tracking No_SINI0068206497.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-19 05:40:34 UTC
AV detection:
23 of 48 (47.92%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.