MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 7e7883f19c5b2dbf9eb6d817e1e624e00e2989bf221d8524dd43ced86e1faa82 |
|---|---|
| SHA3-384 hash: | 64d0c6103ccef9176566cf7feb01375432df5d7fda8b59f12d5f377ecdaa7e52fbf8f8470da15d070e4ef510b4adaed1 |
| SHA1 hash: | 0596584d99f402403895f45e9c08060f11ff6344 |
| MD5 hash: | 09072d67f57f1087c0c17234401dfb25 |
| humanhash: | carolina-ceiling-mobile-speaker |
| File name: | PO INOXIA-2020082.pdf.uue |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 256'159 bytes |
| First seen: | 2020-08-04 15:39:29 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:r1NB30Lc8ctqGTbdolVdrTHEhLAj1pq4YkhrxXqvNHmr:d3kStvbdAhLEy1xPXgS |
| TLSH | F74423B7A528B36D52C042CA0CC4B40FB5CE69D25C791925F931DBD42F49DCECA23AB2 |
| Reporter | |
| Tags: | AgentTesla uue Yahoo |
abuse_ch
Malspam distributing AgentTesla:HELO: sonic315-20.consmr.mail.ne1.yahoo.com
Sending IP: 66.163.190.146
From: OSTO TRADE & CONSULTING GMBH <alexandy40@yahoo.com>
Reply-To: OSTO TRADE & CONSULTING GMBH <alexandy40@yahoo.com>
Subject: Re: RE: PO INOXIA
Attachment: PO INOXIA-2020082.pdf.uue (contains "PO INOXIA-2020082.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Infostealer.Fareit
Status:
Malicious
First seen:
2020-08-04 15:41:04 UTC
AV detection:
15 of 48 (31.25%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.