MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a6473afa5eb4f04eb5fa442198a90c27fbc9da2582e51bc070870cfeb3ba669. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 5a6473afa5eb4f04eb5fa442198a90c27fbc9da2582e51bc070870cfeb3ba669
SHA3-384 hash: 19ce51a0bfd3369ebcad39630c3e4f742c551ca8c9973348e842b53a0e5f49acef5d979c045ad8d4ba353148effcad42
SHA1 hash: 46161c3a9003d4c12d6066d4af74e0560a415433
MD5 hash: 2768ae5cc4f5f0ca91c54c49dd69d75a
humanhash: uniform-moon-island-pip
File name:POOED20201366.arj
Download: download sample
Signature AgentTesla
File size:389'039 bytes
First seen:2020-08-05 12:00:58 UTC
Last seen:Never
File type: arj
MIME type:application/x-rar
ssdeep 6144:v/hYBwSI+HMb2v2zrIE1sQEaFb9H4zKQaQs7F6rNOxwNrHoif+He5UTFBelX7iu5:v0DU4ylFb9H4TaeRtUERGzkHChNo0/c
TLSH A284236D345ACB48C1CE332476F5BDA813C65841A78B0BD9E632F1563E24AE819DC3B7
Reporter abuse_ch
Tags:AgentTesla arj


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail.jetsd.live
Sending IP: 176.119.30.85
From: salesplastic@ashut.com
Subject: PO/O/ED/2020/1366
Attachment: POOED20201366.arj (contains "POOED20201366.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-05 12:02:07 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

arj 5a6473afa5eb4f04eb5fa442198a90c27fbc9da2582e51bc070870cfeb3ba669

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments