MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d15c754a96015b934b0948121b63afef6bca43aa74a204c90f85445c32403f84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: d15c754a96015b934b0948121b63afef6bca43aa74a204c90f85445c32403f84
SHA3-384 hash: 20c95aef68cdcd53269b6a88bd829c4908711b9ff2c967e8774522130ffda693249ca11640c8ba8f41368c88e84a104f
SHA1 hash: b2ce312c9cfe0d2657ff89ff15ddd4f2f9468092
MD5 hash: 0c67a944e365119b3ff93b806c9ff47b
humanhash: victor-cardinal-georgia-hawaii
File name:SWIFT PAYMENT_PDF____________________________________________________.......iso
Download: download sample
Signature AgentTesla
File size:708'608 bytes
First seen:2020-08-27 08:48:43 UTC
Last seen:Never
File type: iso
MIME type:application/x-iso9660-image
ssdeep 12288:e4EN6oHkwuz7l5+IHZS3zpWe44hahYOz+xV7nV+EeGQm5aNwfDnizDGK:2PEwk575S3B/h4Yhxr+XGQmXri3GK
TLSH A1E4121513FCCF15D5FE0ABDA8BD300003A2749A55B8E7967D5CA39A2BA378049727E3
Reporter abuse_ch
Tags:AgentTesla iso


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: dm.net.lb
Sending IP: 209.58.149.66
From: Lisa PanaPesca <becricoh@dm.net.lb>
Subject: RE: PANAPESCA PES50526 SWIFT
Attachment: SWIFT PAYMENT_PDF____________________________________________________.......iso (contains "SWIFT PAYMENT_PDF____________________________________________________.......exe")

AgentTesla SMTP exfil server:
mail.pwmtdubai.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-27 08:50:10 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

iso d15c754a96015b934b0948121b63afef6bca43aa74a204c90f85445c32403f84

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments