MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36d5d33c2c5344de6ab49390e6a9a8a577862e5c73e0142da9bfb36427414632. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 36d5d33c2c5344de6ab49390e6a9a8a577862e5c73e0142da9bfb36427414632
SHA3-384 hash: 3ab1ab9bf7ec9b78b87cfd11dabc844479a5ee3e8d0ef028ae58a745041a7e1b60cb5ece88196cb3bbc91663b086c710
SHA1 hash: caa9f4430aa7cef576a9c1b6b443acd49ab6e6d0
MD5 hash: bb9ab172da83052d9b5f621f30030b3c
humanhash: utah-november-cold-stairway
File name:Proforma Invoice and Contract Documents022020.pdf.rar
Download: download sample
Signature AgentTesla
File size:438'615 bytes
First seen:2020-05-26 08:01:13 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:eDtYOyqsSvN0Ro8rGq2w1e6bZ5r6XL9zlAejMFSrYlsbkkMqOX6PeEb6XSOD:eDtj1N0RonjwdrcW2KSslYbMqOXqOD
TLSH 29942316CDE5E94B87D2B04D2A5484BCEBE61302C271AAD23D3F91D78CE256C62D9DC2
Reporter abuse_ch
Tags:AgentTesla rar


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail0.514.drienimeoni.casa
Sending IP: 68.183.81.45
From: Elizabeth Yee <elizabeth@millenniumminerals.com.au>
Reply-To: standardmedicsys@dr.com
Subject: Re: Invoice & Contract 05/2020
Attachment: Proforma Invoice and Contract Documents 022020.pdf.rar (contains "Proforma Invoice and Contract Documents 022020.pdf.exe")

AgentTesla SMTP exfil server:
smtp.shyuanhzimeng.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-26 08:36:48 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
14 of 30 (46.67%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 36d5d33c2c5344de6ab49390e6a9a8a577862e5c73e0142da9bfb36427414632

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments