MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4e3c2d93b1e9c5fd25802137927a1267d9c4164127eb77b9b83d0112d0b643d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 4e3c2d93b1e9c5fd25802137927a1267d9c4164127eb77b9b83d0112d0b643d6 |
|---|---|
| SHA3-384 hash: | ad508d94b0317a5c1259b55c88014a98d6f5074407f0a98cebc25dd44094ef4b24045bf238688870fc54a343878d67c8 |
| SHA1 hash: | 197896e2708470c36b0ffb9b615df1d5466cb336 |
| MD5 hash: | 7bd5419fb92fd56757a3617c3046263f |
| humanhash: | paris-cup-fix-ink |
| File name: | BANK DETAILS.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 534'744 bytes |
| First seen: | 2020-08-13 07:35:57 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:9+WMis7/CU8IdHoXjroFeNFXRVzPrymsX6u3axEuQ/bHdiG:5bxU8IdHoXjroUzPfsL/u4dF |
| TLSH | 68B423E551B499DF5308CEB52B40D1FB090BC334C0CFEC2ED25AA82669091E95DA97FB |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: oxysupply.com
Sending IP: 37.49.224.93
From: Accounting@oxypayment.com <Accounting@oxysupply.com>
Reply-To: Accounting@oxypayment.com <Accounting@oxysupply.com>
Subject: PAYMENT CONFIRMATION
Attachment: BANK DETAILS.rar (contains "BANK DETAILS .exe")
AgentTesla SMTP exfil server:
mail.privateemail.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-13 07:37:08 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.