MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ccfa5db368daf50f6225b52bd872dec2f67b5a31ef210406e24bc5523fc61c53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | ccfa5db368daf50f6225b52bd872dec2f67b5a31ef210406e24bc5523fc61c53 |
|---|---|
| SHA3-384 hash: | d42c661d6d8107af0b4f849ec0e724657dc1a740e4dd0d8f0f1f011c773b57135b2c9747ddd4cbbd1c4e27685caf66c3 |
| SHA1 hash: | bb2a240a6434a4496d2d1112ef287d5ab25bd8a5 |
| MD5 hash: | 5b918716b8bb8939038594323d4d5b15 |
| humanhash: | mockingbird-kansas-colorado-mexico |
| File name: | INQUIRY.IMG |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'441'792 bytes |
| First seen: | 2020-07-20 09:05:50 UTC |
| Last seen: | Never |
| File type: | img |
| MIME type: | application/x-iso9660-image |
| ssdeep | 24576:Cuh9OPW2rEloDmeBHgQvlGSqkcpk8jwUu:z9OzrsoieBAQvlGSUUU |
| TLSH | 6C65CFC7B66C530CD2AD2FB17A728A744324AF07F5F1960A7BC8EC5E1A3674AD8502D1 |
| Reporter | |
| Tags: | AgentTesla img |
abuse_ch
Malspam distributing AgentTesla:HELO: smtp65.iad3a.emailsrvr.com
Sending IP: 173.203.187.65
From: Yasar Tentage & Textile Industries (Pvt) Ltd. <info@yasartentage.com>
Subject: RFQ- 20/7/20
Attachment: INQUIRY.IMG (contains "INQUIRY.exe")
AgentTesla SMTP exfil server:
mail.makezimbetter.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-20 09:07:05 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.