MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 21a79da30fc086d107f410a3b00c78b5b48221704911efc8fcaad4b113d1fee0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 21a79da30fc086d107f410a3b00c78b5b48221704911efc8fcaad4b113d1fee0 |
|---|---|
| SHA3-384 hash: | cd7a057630bb8b729756c0e00e5f0be8f8be92a05b6de895d8c35d46ba8da9ce706b79a208a7eea05e139bef9e8a15a0 |
| SHA1 hash: | 29d7a1d536f602647e674d41898c1ac3b068f1f7 |
| MD5 hash: | f973c454c76b16f21e3b361da2954e58 |
| humanhash: | cardinal-delaware-blue-violet |
| File name: | PRODUCT LIST.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 914'522 bytes |
| First seen: | 2021-02-07 07:37:21 UTC |
| Last seen: | 2021-02-07 07:37:36 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 24576:uRStEQ4iu+Bi85f7sUHwkf16m1C6Rz2paKa32ng:uRCuu/YUOmk6cQ2ng |
| TLSH | B7153393E7CED9277903181163AB0627CF597A3698D35A43C6E1E7EBEBD05C6E10E600 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: webmail.cyber.net.pk
Sending IP: 203.101.175.37
From: CONTACT <sstc786@cyber.net.pk>
Subject: URGENT REQUEST
Attachment: PRODUCT LIST.zip (contains "PRODUCT LIST.exe")
AgentTesla SMTP exfil server:
smtp.yandex.ru:587
Intelligence
File Origin
# of uploads :
2
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-07 02:12:31 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.