MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 28e0faedbbc8a8e28cf0f36327fe08f7325b9b7a91f68564deaa5ca898599d95. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 28e0faedbbc8a8e28cf0f36327fe08f7325b9b7a91f68564deaa5ca898599d95 |
|---|---|
| SHA3-384 hash: | c36e9d770874bd73b7564450314d18d747376110638bc74f4d827bb3a6bc2a3d1a648355fd131de86355ebd8628bd321 |
| SHA1 hash: | 5cc07f1e04cf69537405d2b92af99d910d68f8ba |
| MD5 hash: | 87bdf410884e23acfd8f1629c448546f |
| humanhash: | undress-skylark-autumn-floor |
| File name: | attachments.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 384'497 bytes |
| First seen: | 2020-07-22 08:55:54 UTC |
| Last seen: | 2020-07-23 04:49:13 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:46mvGwcN6q1aAhtW1ZrJHLuWSDV6pM7xb4Fg3uuII8NOjkmXK+iyhzuoh5fhR0eW:7rNZkrFrzikKZJ35I0jNK+/h5FCMI0QZ |
| TLSH | 3D8423AFF75F96C95C0B5300D3D2C5E24EBF0B97DB3752510179A112AFB0DA2A4828E9 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: plexistab.com
Sending IP: 193.142.58.69
From: Miryana Kutseva <mikutseva@plexistab.com>
Reply-To: Miryana Kutseva <stavecrotts9618@mail.ru>
Subject: RE:outstanding payment
Attachment: attachments.zip (contains "AW AW outstanding payment.exe")
AgentTesla SMTP exfil server:
ike2020.xyz:587
Intelligence
File Origin
# of uploads :
2
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-22 08:57:05 UTC
File Type:
Binary (Archive)
Extracted files:
8
AV detection:
26 of 48 (54.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.