MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ace5d45a67e84cfc93e66018e4785d0b0f59e0748e40394279211a256e72e03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7ace5d45a67e84cfc93e66018e4785d0b0f59e0748e40394279211a256e72e03
SHA3-384 hash: 834e1365c637be44bdd1f69fa919dc401d92ebc2c176bb15bf5b427e3d10f8cf7824df03d8c8141ea11a1a2e29b48342
SHA1 hash: 5feb7daf05e3806854ad510c87789a487c8c9129
MD5 hash: c916fb169ff7466902909cc291b6f3bd
humanhash: enemy-aspen-uniform-nevada
File name:Shipping DOC -Arrival Notice For BL - 120910126192 Vessel - MV Crystal BAY Voyage - 19014S.pdf.arj
Download: download sample
Signature AgentTesla
File size:402'731 bytes
First seen:2020-07-24 15:04:13 UTC
Last seen:Never
File type: arj
MIME type:application/x-rar
ssdeep 6144:Hv1jHNyTCDjlTd4rVRclmuBrv8lsmduvNJ9Dcw3R3eOY6uPSiwGgaCKLgHX:Hbj1TC+1wsmdeN7vhfuqxGgaCKLo
TLSH 9B842365584A50E9CB48D35A4C40E2EC8C0615EFC007BF238ED79FCE1A66E5DA46DBBC
Reporter abuse_ch
Tags:AgentTesla arj


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: fmt05.web.com.ph
Sending IP: 65.49.80.88
From: ffdeduyo@curb.com.ph
Subject: RE: Arrival Notice For BL - 120910126192 / Vessel - MV Crystal BAY / Voyage - 19014S
Attachment: Shipping DOC -Arrival Notice For BL - 120910126192 Vessel - MV Crystal BAY Voyage - 19014S.pdf.arj (contains "Shipping DOC -Arrival Notice For BL - 120910126192 Vessel - MV Crystal BAY Voyage - 19014S.pdf.exe")

AgentTesla SMTP exfil server:
droid@arigmed.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-24 15:06:07 UTC
AV detection:
12 of 48 (25.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

arj 7ace5d45a67e84cfc93e66018e4785d0b0f59e0748e40394279211a256e72e03

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments