MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5cee5651bd151a19a029130c64968ec39e79ff969cde85aa847ec5629102add1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 5cee5651bd151a19a029130c64968ec39e79ff969cde85aa847ec5629102add1 |
|---|---|
| SHA3-384 hash: | b5fb59a7ecf54b39698b24ed2a56b5bb13859f6b79f59709ceedbb4090c01520470b6bfa5dd872655ef706d3b6a7ddbb |
| SHA1 hash: | f4603a112ab880535d7f4d0caf04fe2c136fdcbe |
| MD5 hash: | dbf17686d31b46f10add151fb961a450 |
| humanhash: | california-cold-twenty-potato |
| File name: | Image001-pdf______________________________.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 467'403 bytes |
| First seen: | 2020-08-14 08:20:08 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 6144:O3kZvTuCvK3+hinwPtVVDeNzKkwCD4R56uoN3QIhg9MSWSUgl2IC0FUKCO:O3kVhpVDgzpZ3M9MSpUgZGE |
| TLSH | 06A4234E10C742563427B033A3D24E8532E6B05E1A691850EEDB7F7E5D1E9C35EAC2EB |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: fast-sea.com
Sending IP: 45.137.22.118
From: Fancy Gao(高凤霞) <fancygao@fast-sea.com>
Subject: Re: RE: MS22825 + MS2287 (19 containers are delivered) // MS22832 + MS22887 (processing) .// Daily Report of CHINT'S BUSINESS
Attachment: Image001-pdf______________________________.gz (contains "Image001.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-14 08:22:06 UTC
AV detection:
8 of 48 (16.67%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.