MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0388cd2705394755fad4bff2aafb1ad227f055a55a7f886118c0d84f130d9a3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 0388cd2705394755fad4bff2aafb1ad227f055a55a7f886118c0d84f130d9a3a
SHA3-384 hash: d103098cf048e0c92af85b62648ca17a66551e08aafcb5cc3a3cba0745bea6bfd8099ad025a0c3c207a05e84e4231012
SHA1 hash: fd783629f5680ae539724cecf6349113f13003fa
MD5 hash: 52ee2d68bbb764a731c348b48721d97f
humanhash: freddie-wyoming-venus-washington
File name:ref2020120009ESPDF.gz
Download: download sample
Signature AgentTesla
File size:764'618 bytes
First seen:2020-12-09 10:50:09 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 12288:Okh5gw30mnXvnM/0dW1SPMaJpebmiaNFQYNDRW1tVcejgdVMTenhZmUQojQd4qtQ:Okh5gwEmnE8keMaJobmiaXNhRW1tV+sE
TLSH 3AF423CDFA299D36E30E0C31188D49BE608C5CA77E4A1D8D6C04875903D937D9AABFB1
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: panel020.areaproject.net
Sending IP: 185.55.249.120
From: ENRIC DALMAU BACIERO <enric.dalmau@bbva.com>
Subject: Transferencia bancaria ref:2020120009ES
Attachment: ref2020120009ESPDF.gz (contains "ref2020120009ESPDF.exe")

AgentTesla SMTP exfil server:
smtp.yandex.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
128
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Sudloader
Status:
Malicious
First seen:
2020-12-09 10:51:05 UTC
AV detection:
20 of 48 (41.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz 0388cd2705394755fad4bff2aafb1ad227f055a55a7f886118c0d84f130d9a3a

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments