MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ff21f07cada4b2824285aa1756a784654e6e7637159a70f82357c5d71474b1af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | ff21f07cada4b2824285aa1756a784654e6e7637159a70f82357c5d71474b1af |
|---|---|
| SHA3-384 hash: | 19315c4d899fdc7188ec09b8dc4f7d2a5fb253bdb9351deb6fcd93515f5a041339f018b0b05ed8b7a60e74aed1ef1ced |
| SHA1 hash: | b4b161998728c032316fbad1853c4f388297a33b |
| MD5 hash: | a9b6993df1c73ccca30565d647dd1436 |
| humanhash: | johnny-jig-iowa-blue |
| File name: | purhase order.pdf.gz.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 391'996 bytes |
| First seen: | 2020-08-05 08:37:19 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:zGK7isw7N7rWpHxI5mTqnYWrGj2ZRyoPJHFRETQ69Kaa83:zGKq7rWP4mALrGaZZJlRETQ69Kc |
| TLSH | 73842330132AF79D70FFF0E1A757E9E5AD06988EAC13DA54898F69547DAA1ECC90C007 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: WINDOWS-J50OHC1.home
Sending IP: 175.107.196.65
From: KARACHI TRADING CO.,LTD <dha@dhakarachi.org>
Subject: FW: purchase order
Attachment: purhase order.pdf.gz.rar (contains "rttK0MJ8OizUCyz.exe")
AgentTesla SMTP exfil server:
smtp.fretian-muc.de:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
58
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-05 08:39:04 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.