MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e51697b7fd49eeef3df1aebfeb1b6957d519a9527db26bd86a28c6a348c364d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | e51697b7fd49eeef3df1aebfeb1b6957d519a9527db26bd86a28c6a348c364d0 |
|---|---|
| SHA3-384 hash: | 4739f748fe29e28f30367eed725263b1454abb7ad602ab98af7f250fcaf3842c1128e24e6e003f28439e8ac346be4fa7 |
| SHA1 hash: | e9b0012d9ce628dc814a118f3c61aec4a5751c11 |
| MD5 hash: | 8fec13b90afa60f0fa67e6f798c2d0b8 |
| humanhash: | iowa-beer-football-blue |
| File name: | orden de compra_pdf___________________________________.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 572'096 bytes |
| First seen: | 2020-08-17 18:00:04 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:AFyl4qEpOUfcS85Lz37MNHr+JiLlBgCEYqUt5P4l8Y9AHih:AK4BpFfcSGLT7aL+JiIYJt5P4l8Y3 |
| TLSH | BAC423AC1C0200213E56E2BCB45DF62FC8E2887DD74D47CE6A7D85F45162F66F882B99 |
| Reporter | |
| Tags: | AgentTesla ESP geo gz |
abuse_ch
Malspam distributing AgentTesla:HELO: auto-deal.gr
Sending IP: 95.211.208.25
From: Nicholas Rivecca<xasapi@auto-deal.gr>
Subject: RE: orden de compra
Attachment: orden de compra_pdf___________________________________.gz (contains "orden de compra_pdf___________________________________.exe")
AgentTesla SMTP exfil server:
smtp.erneralduae.com:587
AgentTesla SMTP exfil email address:
jerryforward@erneralduae.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-17 18:01:18 UTC
AV detection:
14 of 48 (29.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.