MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ccacb95e04e5efe4884552f8faa9507a2de32c30e46f196e9717156f68c96961. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | ccacb95e04e5efe4884552f8faa9507a2de32c30e46f196e9717156f68c96961 |
|---|---|
| SHA3-384 hash: | a8041fd7cb6355caab2744bb9c2fa3fee6a9a6e576cb9fe4c64c5ff07fc6424bc25866db738d25d0e341d1b87f62abb6 |
| SHA1 hash: | ede6907239b00e20b73dde8c045fcbb24befdcb6 |
| MD5 hash: | 922bd1f93351cb3d4037cc7bcee251b9 |
| humanhash: | july-california-cup-georgia |
| File name: | POKVRQ-7436819.arj |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 388'880 bytes |
| First seen: | 2020-08-19 07:20:15 UTC |
| Last seen: | Never |
| File type: | arj |
| MIME type: | application/x-rar |
| ssdeep | 6144:jtWtjoaS6Pej1p7oipvRa3u7xzTQDcqczpMorc+u9Ku3XITw9mOwfirK8QEZoJp/:Utj41pM8vRa3IVzpnrc+Dw9B+8hZqpWe |
| TLSH | C684235682E2889EEF5E3391D46C9F2A85DA10F36118113DD4C7B17FE36C18BE628687 |
| Reporter | |
| Tags: | AgentTesla arj |
abuse_ch
Malspam distributing AgentTesla:HELO: olives.ru
Sending IP: 185.222.57.198
From: Alevtina Ivanova <alevtina_ivanova@olives.ru>
Subject: REF FOR PURCHASE ORDER KV/RQ-7436819
Attachment: POKVRQ-7436819.arj (contains "POKVRQ-7436819.exe")
AgentTesla SMTP exfil server:
mail.titanworkinharders.com:587
AgentTesla SMTP exfil email address:
llogg@titanworkinharders.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.CryptInject
Status:
Malicious
First seen:
2020-08-19 07:22:05 UTC
AV detection:
16 of 48 (33.33%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.