MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 391efe10896bf499fc925486977ff31c400b4356c05bcc5f6cde2cdeca4d728c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 391efe10896bf499fc925486977ff31c400b4356c05bcc5f6cde2cdeca4d728c |
|---|---|
| SHA3-384 hash: | c6468cfc279bd79c367efcc75eb2bd45fe4a975ca983bb78d378ada9db2008faf26291139464126c890758628a425b38 |
| SHA1 hash: | 1dd9a1c5c87b974fe2b4e3620ae8d45a368a050a |
| MD5 hash: | 88a15ec9074875aea41b4656dfcbc8e7 |
| humanhash: | fish-robin-green-echo |
| File name: | REF-091100679-BEC.pdf.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 2'989'523 bytes |
| First seen: | 2020-07-22 06:40:51 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 49152:rBxFigB37XfoC4QZy6SeGHY5duuIWDNABr1tgAc7GLmDUjaf4mIwkVmG4giBHe1/:rB9JcC4J6RF5dQ6Qr1ZaXAkLWmG4geHI |
| TLSH | 6DD53312E49BB5612C187873CF817FA98C4FB84DAB0859E3A4FBCE5B449106AD4B7371 |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: server.megatroncorp.community
Sending IP: 162.241.205.158
From: NICHAKORN ARJTAKU <birger.erstad@saint-gobain.com>
Subject: REQUEST FOR QUOTATION
Attachment: REF-091100679-BEC.pdf.gz (contains "REF-091100679-BEC.exe")
AgentTesla SMTP exfil server:
mail.hajartrading.net:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-22 06:42:07 UTC
AV detection:
21 of 48 (43.75%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.