MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7e5e9bc8dd0e7c695b825c172f1abe18269193fa2f1e264c1b9be7ec8750b75. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: a7e5e9bc8dd0e7c695b825c172f1abe18269193fa2f1e264c1b9be7ec8750b75
SHA3-384 hash: 94705217497af26ef1bc2b028c2a6cbdb1f1bbcbb70eabd1228a00d7c214217e32f09cdbb62a5cd0df1b7592ba615e3d
SHA1 hash: 4c080786a42107645539e3770e471189abc91ca9
MD5 hash: b1d7631ff6ea001ad1f621b3dadf4a7e
humanhash: johnny-ack-blue-lithium
File name:CPX77944 CUE.ppt.pdf.r04
Download: download sample
Signature AgentTesla
File size:563'020 bytes
First seen:2020-05-15 06:34:39 UTC
Last seen:Never
File type: r04
MIME type:application/x-rar
ssdeep 12288:PQLl6r4mEcGAOj+i9nWjz1EVn++N/SSxh0lJi0YBlVrIUyLSTK5vG:PQLEhGRj+Jlo/SSHh0YBj0Up+G
TLSH CBC433FC776CA6990921BF610EDEFA89A1C40FF0C470623B7B9D9A72E49B59C463450C
Reporter abuse_ch
Tags:AgentTesla r04


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: srv107703.vps.myhostingpack.com
Sending IP: 104.131.56.112
From: Ventas y pedidos_Luis E. González R. <enrique.gonzalez@automatismostecsia.com>
Reply-To: engonzalez@automatismostecsia.com
Subject: RE: Realizar Factura. Tramite de IE Fact.
Attachment: CPX77944 CUE.ppt.pdf.r04 (contains "CPX77944 CUE.ppt.pdf.bat")

AgentTesla SMTP exfil server:
mail.climasenmonterrey.com.mx:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Grp
Status:
Malicious
First seen:
2020-05-15 06:35:33 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
26 of 48 (54.17%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r04 a7e5e9bc8dd0e7c695b825c172f1abe18269193fa2f1e264c1b9be7ec8750b75

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments