MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e19239f28b9b347b02f2f0a837b169970821a88f75aa603768ae98e420808f18. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | e19239f28b9b347b02f2f0a837b169970821a88f75aa603768ae98e420808f18 |
|---|---|
| SHA3-384 hash: | dc30c4bc82c30e800fceeb195c1af5e81c1cbe934ec03bbfa64f296a6d1153947bb474496eb4059c54b9e030730d2919 |
| SHA1 hash: | 113ba12a4972b45bcd6832ba4039a3645f8aab2c |
| MD5 hash: | 1e906cf0b0ee343284d0a572a95fb663 |
| humanhash: | uniform-spaghetti-massachusetts-mississippi |
| File name: | Orden Compra PO 45003965890.r00 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 657'093 bytes |
| First seen: | 2020-07-17 16:26:15 UTC |
| Last seen: | Never |
| File type: | r00 |
| MIME type: | application/x-rar |
| ssdeep | 12288:LMrudIHLnVrND9mlX6iV2GlvWJDCsV8fJgQC/SEGmHrYzpz0INouyNC9:yuqUlXFsdBVCJgH//GmHszyuyM9 |
| TLSH | 10E4233B74A721A9EAD40528DF8E76DF8198BC782C527AEE3974714ECFE193009D4139 |
| Reporter | |
| Tags: | AgentTesla r00 |
abuse_ch
Malspam distributing AgentTesla:HELO: s007.ehost.es
Sending IP: 217.160.165.85
From: Juan Gonzalez <juan.gonzales@vibracoustic.com>
Subject: RV: VIBRACOUSTIC S.A.U - PO 4500396589 - OC539
Attachment: Orden Compra PO 45003965890.r00 (contains "PO 4500396589 VIBRACOUSTIC SAU 071620200.exe")
AgentTesla SMTP exfil server:
mail.corroshield.co.id:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2020-07-17 16:28:06 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
2/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
0.87
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.