MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1dd2f05d81504c6694708613491006c161e2800a02b047e4079a4743642652bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 1dd2f05d81504c6694708613491006c161e2800a02b047e4079a4743642652bd |
|---|---|
| SHA3-384 hash: | 7f6942c912fa425675cfdcb8fde067107d3c6c8863e6669239466594e66463b157f8ac40d6564bab3e5c6a6cc100eaa0 |
| SHA1 hash: | e73064fb36b764fe427277014e3b241fb0939846 |
| MD5 hash: | 8373d892c6a2d5f5f6c7446f61f3759e |
| humanhash: | network-violet-blue-don |
| File name: | Purchase Order 2550619.xlxs.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 394'430 bytes |
| First seen: | 2020-07-24 08:00:00 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:o8NUBdxi1YgUFSiPrtiMFC8+fE2xuWUSFczEZ0YuJ3W756M78+6/guXTyCbgBdcL:oiUdxi1YLpJqpWIpmzTRXrU79yn |
| TLSH | 9D8423BB23155DC702057B914A57EF881431DEA642F1DA2CFF9519B318F12BCE328E8A |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: webmail.cyber.net.pk
Sending IP: 203.101.175.37
From: SL Liong <centcorp@cyber.net.pk>
Subject: Purchase Order 2550619
Attachment: Purchase Order 2550619.xlxs.zip (contains "Purchase Order 2550619.xlxs.exe")
AgentTesla SMTP exfil server:
us2.smtp.mailhostbox.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-24 08:01:06 UTC
AV detection:
20 of 48 (41.67%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.45
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.