MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cde2ea800fe542e07ce577d861eff2632dca4d6f0603d25a00d94b28ad523b5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | cde2ea800fe542e07ce577d861eff2632dca4d6f0603d25a00d94b28ad523b5f |
|---|---|
| SHA3-384 hash: | 4c73d5f078f5e7e3e03ce202071890d33f82aa9f5c4005f2bd53f2ae883ae2e8f784d70d07b96e0e87cd67c6d9d20ff5 |
| SHA1 hash: | 9abf8457de911a903af00597e8a4138323794e3c |
| MD5 hash: | 6a147ce5caea89265d3ff7b97c017ea3 |
| humanhash: | august-cold-fix-carolina |
| File name: | MV NAHIDE-M EDPA REQUEST FOR SHIPYARD CALL.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 715'014 bytes |
| First seen: | 2020-08-04 10:10:15 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:LtyxNMibzUQDinCIuvsxzCA5NAKY6D3jA3v6ttXl0mS+iHbYQK:LtyxhFunCi4A5NAKY6TMvm9lEHsQK |
| TLSH | 97E43321AFACAA1627884107B21050D6E7635170F96BBACEDDE470D179BF937FCB2412 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: cx0.76.swmianllc.ga
Sending IP: 139.59.213.35
From: Panlink Shipping Agency(Jiangyin) Co.,Ltd <agency@panlnklogistics.com>
Reply-To: howardbrisson@gmail.com
Subject: MV NAHIDE-M // EDPA REQUEST FOR SHIPYARD CALL
Attachment: MV NAHIDE-M EDPA REQUEST FOR SHIPYARD CALL.rar (contains "MV NAHIDE-M EDPA REQUEST FOR SHIPYARD CALL.exe")
AgentTesla SMTP exfil server:
mail.privateemail.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-04 10:12:06 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.