MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cfebd0211852b2928e39a3c05225a2087dda2883aa3ca983ab04e72b9874bd25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: cfebd0211852b2928e39a3c05225a2087dda2883aa3ca983ab04e72b9874bd25
SHA3-384 hash: 4d40d55f2ff68257d9af85331d9d6e762b462c0ec4bae0c3037df6dc4ffe8ba6f79a956f5f76ab0b75211010e235e070
SHA1 hash: 956dd96043a1951a343d5af4b4277bed05f936bd
MD5 hash: a460c4e0d8eb317932e61517c4e99854
humanhash: salami-arkansas-pizza-blossom
File name:Payment confirmation 16101830, 16101943, 16101980______________________________PDF.GZ
Download: download sample
Signature AgentTesla
File size:420'548 bytes
First seen:2020-06-03 09:09:11 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:ydpF1z/slepp6je1lNCzJETk2dLRr3JKePnXKBVdDQKhsbSx12TC8x:ydvF/sl+p6O9gqT1XKBV9jhsO2eW
TLSH 179423D2596054079E97F2ACDFD7CB1502BF3400F76A9D42811F84AAA33CF9A44BB68D
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: xray747.startdedicated.net
Sending IP: 188.138.88.201
From: Kuttaiyappan Arangarajan <xasapi@auto-deal.gr>
Subject: AW: Message Ref (16101830, 16101943, 16101980) // 3 invoices.
Attachment: Payment confirmation 16101830, 16101943, 16101980______________________________PDF.GZ (contains "Payment confirmation (16101830, 16101943, 16101980)______________________________PDF.exe")

AgentTesla SMTP exfil server:
smtp.yandex.ru:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-04 04:29:30 UTC
AV detection:
18 of 48 (37.50%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip cfebd0211852b2928e39a3c05225a2087dda2883aa3ca983ab04e72b9874bd25

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments