MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d6173fa88347debef64c992f6585a3d82646a4d97f75a7f1d16548a8867274d4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | d6173fa88347debef64c992f6585a3d82646a4d97f75a7f1d16548a8867274d4 |
|---|---|
| SHA3-384 hash: | 6ad883ff209561becab69cd97687683067085cd03a12a83609ca6bb6a1fed5bccd5fbaf7bec8a3c4287ab4b972c264d6 |
| SHA1 hash: | f6146d40940c4b0e1cb8ceb9bd0e673176fb0767 |
| MD5 hash: | 8636ec8ce48e860680c20ef7d9ba5b6b |
| humanhash: | west-nebraska-failed-ack |
| File name: | SUNCOAST-purchase-order.XML.newfile.xls.email.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 446'289 bytes |
| First seen: | 2020-07-31 16:05:59 UTC |
| Last seen: | 2020-07-31 19:07:43 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:R6rkMOFA9P5S3bBsvb4IRXNYi7tLngSWFx:nz0P5CbG3FWiqjf |
| TLSH | CE942371E20B366BE7C70F67E5644254BB0A04AB27311866BF4E73EF38B4D69A354205 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: suncoastmarketing.com
Sending IP: 23.159.176.84
From: Silvia Brull <purchases@suncoastmarketing.com>
Reply-To: Silvia Brull <purchases@suncoastmarketing.com>
Subject: FW: Purchase order
Attachment: SUNCOAST-purchase-order.XML.newfile.xls.email.zip (contains "SUNCOAST-purchase-order.XML.newfile.xls.email.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
6
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-31 14:33:08 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
19 of 27 (70.37%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.45
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.