MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1ad5465041a91aaa3c3c2a925dc13dc149a3aeb7087f39a3c93ce69bb7984d7f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 1ad5465041a91aaa3c3c2a925dc13dc149a3aeb7087f39a3c93ce69bb7984d7f |
|---|---|
| SHA3-384 hash: | 9b7f4235136d028b57faaf8f09a79328167fa615aae686ff5d32e32fa890ebc30a974b6aefea0deddbeb58410a092b79 |
| SHA1 hash: | d2a751129eb7838484f8058bb382b2c9f46c080b |
| MD5 hash: | 3720a6f94c82aa5e6c6242b8fcd49852 |
| humanhash: | maine-table-california-muppet |
| File name: | scan-copy.tar.img |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 2'686'976 bytes |
| First seen: | 2021-10-08 08:11:43 UTC |
| Last seen: | Never |
| File type: | img |
| MIME type: | application/x-iso9660-image |
| ssdeep | 24576:Jx+L7D3+1N8wL0R1ldX8k88Bd+L7D3+1k2ayKbW:PWn+1N8wwdX8EWn+1k2hKbW |
| TLSH | T17FC507002695C701D1B637F4D864CAF093656C55EA29C28B2DF1BEDB79B1B03CE11AAF |
| Reporter | |
| Tags: | AgentTesla img |
cocaman
Malicious email (T1566.001)From: "sales <sales@cyborgit.net>" (likely spoofed)
Received: "from cyborgit.net (unknown [185.222.58.155]) "
Date: "7 Oct 2021 21:21:40 +0200"
Subject: "Scan Doc # PO/07/10/2021"
Attachment: "scan-copy.tar.img"
Intelligence
File Origin
# of uploads :
1
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
monero obfuscated packed
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-10-08 08:12:10 UTC
File Type:
Binary (Archive)
Extracted files:
70
AV detection:
16 of 28 (57.14%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.