MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39b00b50c0ad678f85facc2890dd5ee97d585c1b4aa0292dabd467dbdf67ea35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 39b00b50c0ad678f85facc2890dd5ee97d585c1b4aa0292dabd467dbdf67ea35
SHA3-384 hash: 92e045c734f7f24e81d1a44c9242da706cab77b8bca59d4cb0ca4aef2256046967769aab078d2dd8ef46caab327f7e6c
SHA1 hash: e39c188089cbfb61937b50f5841faa8f93cf0cb1
MD5 hash: 9d39b3a7a0b077e1005e13459a5aa4b1
humanhash: grey-idaho-mirror-one
File name:Pro-Forma Invoice and Sales Contract -05272020.pdf.rar
Download: download sample
Signature AgentTesla
File size:415'473 bytes
First seen:2020-05-27 07:42:20 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:itIsRo5yChx6elcUVZvX1wsGC1mSPrKfk:iiP5yLe2Ubf1JGOKfk
TLSH 01942399AE73972C935E10B920542C0604F44849D634FDDE8B53B2FB140FB9EA7B96EC
Reporter abuse_ch
Tags:AgentTesla rar


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail0.716.dlvtminio.casa
Sending IP: 134.209.155.78
From: David Holborow <info@metalandmore.com.au>
Reply-To: standardmedicsys@dr.com
Subject: Re: Pro-Forma Invoice ~ Sales Contract ~ 05/27/2020
Attachment: Pro-Forma Invoice and Sales Contract - 05272020.pdf.rar (contains "Pro-Forma Invoice and Sales Contract - 05272020.pdf.exe")

AgentTesla SMTP exfil server:
smtp.shyuanhzimeng.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-27 09:04:59 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
15 of 29 (51.72%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 39b00b50c0ad678f85facc2890dd5ee97d585c1b4aa0292dabd467dbdf67ea35

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments