MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b04beb4fee64af6626f48c5b8d893d66a9d7be394c5ff0c7bc53b24da657e5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 4b04beb4fee64af6626f48c5b8d893d66a9d7be394c5ff0c7bc53b24da657e5c
SHA3-384 hash: ab1b5e886cc8e537e7288830f39b6183d2a0419ce3b0cb7aad9d0859b84f3078010e6befcffc9e3d3fe97607df8fd28a
SHA1 hash: a6c343fb38da689151ad5d89ef1e1180dbe467fe
MD5 hash: e00aeb6db258bb6cb3ccffe650befb74
humanhash: triple-orange-sodium-eighteen
File name:USD2 SWIFT _SCAN TT 190617_2019-NLCIV000003576_ES146009_30309679.z
Download: download sample
Signature AgentTesla
File size:425'248 bytes
First seen:2020-05-20 07:47:10 UTC
Last seen:Never
File type: z
MIME type:application/x-rar
ssdeep 6144:w1x6596BqQ3fYHeX7MoxwMpkkPS8KUwzRZV961QLBQ5EMUB+aJQ1m0ZJl5SL:265wBqQPYH22pkXGQaJOTreL
TLSH E39423B69B065FB1C5528256D42BA33F210B6C79EA9BE63CD4BB1E33A52031C44D3CD6
Reporter abuse_ch
Tags:AgentTesla z


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail.ihszimbra21.com
Sending IP: 94.138.192.213
From: Vakifleasing <sales@urbanfacades.com.au>
Subject: AW: Swift 2
Attachment: USD2 SWIFT _SCAN TT 190617_2019-NLCIV000003576_ES146009_30309679.z (contains "USD2 SWIFT _SCAN TT 190617_2019-NLCIV000003576_ES146009_30309679.exe")

AgentTesla FTP exfil server:
ftp.connectus-trade.net:21

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Agensla
Status:
Malicious
First seen:
2020-05-20 08:36:41 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
17 of 30 (56.67%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

z 4b04beb4fee64af6626f48c5b8d893d66a9d7be394c5ff0c7bc53b24da657e5c

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments