MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c33fac4996174532c5c5b71faed96554784048ba569a159f44203c6abbb4b824. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c33fac4996174532c5c5b71faed96554784048ba569a159f44203c6abbb4b824
SHA3-384 hash: 6b41122e150a265d5b115f0c6b31a1298825fdf54978c89cc17e73dbb6d400a591de6ac9b3365db564cf34545faa04a5
SHA1 hash: c7b26583719384bbcdc3822876f5e972d781b298
MD5 hash: d533d1785b429d03dcab7e3b1281e32f
humanhash: violet-video-mirror-october
File name:RFQ36586911052020_Scanned from a xerox multifuntional device001.img
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-05-11 08:42:16 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 24576:tWqfCXk3cwaX0ilUb97hdCi7cf23OfLuMP:teudCi7M230LuMP
TLSH 15456A0631DC66EAE0795BF41EA0F218E3A16C252452DF696CD4B5CA52B4F42C4B3E3F
Reporter abuse_ch
Tags:AgentTesla img


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: barokahperkasagroup.com
Sending IP: 139.99.19.82
From: Al-Shammari Bandar <royalkingali@barokahperkasagroup.com>
Subject: Request For Quotation For SAUDI ARAMCO - SAUDI ARABIAN REFINERY RENOVATION - Phase 2 Project
Attachment: RFQ36586911052020_Scanned from a xerox multifuntional device001.img (contains "RFQ36586911052020_Scanned from a xerox multifuntional device001.exe")

AgentTesla SMTP exfil server:
smtp.ttsi-kr.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Geniso
Status:
Malicious
First seen:
2020-05-11 09:36:40 UTC
File Type:
Binary (Archive)
Extracted files:
18
AV detection:
18 of 47 (38.30%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

img c33fac4996174532c5c5b71faed96554784048ba569a159f44203c6abbb4b824

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments