MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3827842163760cefa4a0f4adbfaa0d6f3ce13a390d86196373b2757eec1c395. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: a3827842163760cefa4a0f4adbfaa0d6f3ce13a390d86196373b2757eec1c395
SHA3-384 hash: 547f75f341d67f2422b3a2d9628a4f739769d99df13462914946f8ccad2641a3fd118724c4b399365163a625755a6284
SHA1 hash: 8d359a4b6c85614fae1c42c638ea9ea6ee2ca6bb
MD5 hash: e63590d7724311cd82b35ec966fb4db2
humanhash: mountain-ohio-delta-angel
File name:Scan_TT_MT103_Swift_Copy_Outstanding_Payments_Exchange_SCAN_05_11_2020.gz
Download: download sample
Signature AgentTesla
File size:405'288 bytes
First seen:2020-05-10 14:25:30 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:UDSHIOC894CHzHdwa5GDEBH55f7KSn65K+DIH0fJbdRqzeA:UDSox815wfDuH7KzK+DIUfJbdRqzeA
TLSH 438423EF3907877DE39E58A29C98B0664CBC09DB0F0CD9553198E46D967620C3D4CABB
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: server1.istanbulnet.net
Sending IP: 5.9.14.147
From: International-Remittance <enquiries@interchange.eu>
Subject: Re: BALANCE PAYMENT(103) TT
Attachment: Scan_TT_MT103_Swift_Copy_Outstanding_Payments_Exchange_SCAN_05_11_2020.gz (contains "Scan_TT_MT103_Swift_Copy_Outstanding_Payments_Exchange_SCAN_05_11_2020.exe")

AgentTesla SMTP exfil server:
smtp.outlook.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-10 14:35:53 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
20 of 48 (41.67%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz a3827842163760cefa4a0f4adbfaa0d6f3ce13a390d86196373b2757eec1c395

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments