MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12c8aa7d4ab57c71ae4ab215a7463abb2a9dc6d02c75eb4843b9dd71936c4f89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 12c8aa7d4ab57c71ae4ab215a7463abb2a9dc6d02c75eb4843b9dd71936c4f89
SHA3-384 hash: 37887cb43d1050f719b00c7b69483e1837faab4d1f8158abeefbed7f4964c8559351ff3ac2ec93792d8c4bc3eff1c74b
SHA1 hash: 3ffc7efb5d4a1f5e451b7f63d4e222e86dc1308c
MD5 hash: 068aa60b414ee63f5e24399eb926246a
humanhash: zulu-cat-hawaii-kansas
File name:Order 4500121785.img
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-10-20 07:23:34 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 12288:5qkKBk994u1d2WDpJtKvyOKJfELdc/LaEqVnZBU:5fKB29x1UigvvKJfEBc/wnZ
TLSH AA458D063B91616FDA7585B0C1341E2CE721E221729BD346E537D2E4BE4E3AFED021B6
Reporter abuse_ch
Tags:AgentTesla img


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: ibronmetal.com
Sending IP: 45.153.240.123
From: Jbiguri<jbiguri@ibronmetal.com>
Subject: Order 4500121785
Attachment: Order 4500121785.img (contains "Lime_vgchik teleort 2.0.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-19 22:15:50 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

img 12c8aa7d4ab57c71ae4ab215a7463abb2a9dc6d02c75eb4843b9dd71936c4f89

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments