MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 410baefcbb61c17f587c39ae1f97836a1095f571cdd11360418e3a68dbd99c0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 410baefcbb61c17f587c39ae1f97836a1095f571cdd11360418e3a68dbd99c0e |
|---|---|
| SHA3-384 hash: | bacc9a791f720833fdfdb19dc8aea8fdf625d6bc85b066dcccf89e4ffd8c45fb05241281dcad18afae24e09d7a5f88f3 |
| SHA1 hash: | 209185bb00ba05b441f5600ba77fa2af8684ae3f |
| MD5 hash: | 4b804e21cc7b06d1e465c2a1853cb40c |
| humanhash: | london-spring-jupiter-august |
| File name: | ZANTEX PURCHASE _PDF____________________________________________,,,.iso |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 706'560 bytes |
| First seen: | 2020-07-21 07:36:28 UTC |
| Last seen: | Never |
| File type: | iso |
| MIME type: | application/x-iso9660-image |
| ssdeep | 12288:iRKH3DASUv4AiupOC6UdjHHEH7XwLurd:iMH3cjNpj6G4bgLurd |
| TLSH | 9FE48D01D3B445D9DBBE1BB9E425004047B5AC5AA7EAE35D2BC8F1E90EB23518B13F63 |
| Reporter | |
| Tags: | AgentTesla iso |
abuse_ch
Malspam distributing AgentTesla:HELO: outlook.com
Sending IP: 95.211.211.232
From: Silvia Tessari <sales.saomaivina@outlook.com>
Subject: ZANTEX PURCHASE ORDER ? A/305/2020
Attachment: ZANTEX PURCHASE _PDF____________________________________________,,,.iso (contains "ZANTEX PURCHASE _PDF____________________________________________,,,.exe")
AgentTesla SMTP exfil server:
smtp.yandex.ru:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
60
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-21 07:38:06 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legal
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.