MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd995254d59965755cb01e59fd244abcf2df29c0979de0e31789879fc2a495e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cd995254d59965755cb01e59fd244abcf2df29c0979de0e31789879fc2a495e8
SHA3-384 hash: f8307a7409c20027368513793c4fefb76faab1e5df1a070a048fa5425625e644dc83c1e7a5dfe3dd0114c6f4db8f7ff1
SHA1 hash: 6c6708238f02a5d57f28a618a97beb40935b99e0
MD5 hash: f8e9270d027d199ca0bb42fd839bdc30
humanhash: autumn-mars-sodium-nitrogen
File name:Letter.gz
Download: download sample
Signature AgentTesla
File size:500'017 bytes
First seen:2020-08-11 11:47:44 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:1qTu5YzdyQdZ4a78J+LibPiMcvN9ygekaDfXd6KP4/aLw7oXXLyehprzoa85X9SZ:IpLM6MiN9y/1DfNIVUrrhp38Bc7XrZl
TLSH 42B4235A3F1EF2A710E79262E90A740F511D42D3F4F8F10A18F45726431B69AAB1BE7C
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: vq0.719.miditruni.ga
Sending IP: 161.35.74.106
From: Accounts <accounts@719.miditruni.ga>
Subject: Payment
Attachment: Letter.gz (contains "Letter.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2020-08-11 11:49:04 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz cd995254d59965755cb01e59fd244abcf2df29c0979de0e31789879fc2a495e8

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments