MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a70e57bb5d44d2442d764beb6069cecbbba77e5a660eabbfb798784a6ade754. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2a70e57bb5d44d2442d764beb6069cecbbba77e5a660eabbfb798784a6ade754
SHA3-384 hash: 8dc3976264ee1f03398ab67832f6f866094c3d890a55070a3a4d84a8d72d5eec03bf097020f8b5284cd5081bc844397e
SHA1 hash: 9b3a1b7382dbad13b4e424203dac724473ca405e
MD5 hash: da314abd681a1e60cad6758f6c0c6dd8
humanhash: social-mobile-alpha-echo
File name:RFQ_N0000000002.7z
Download: download sample
Signature AgentTesla
File size:472'504 bytes
First seen:2021-02-06 08:25:17 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 12288:3nUxmlJm0ShqW9KWZh3AUyqrEFHBbH8saur4sy+SXr:jm0TFWf32quBbH8sauMsyvr
TLSH F9A42362236E24055BE2CFB482663C5E925BDF53C4AB394FEDCF416086BBF974081356
Reporter abuse_ch
Tags:7z AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: se6k-iad1.servconfig.com
Sending IP: 173.231.242.1
From: Jelena Pajkić <jelena.pajkic@comtrade.com>
Subject: Request for Price Quotations
Attachment: RFQ_N0000000002.7z (contains "RFQ_N0000000002.exe")

AgentTesla SMTP exfil server:
telnet 161.129.71.137 49746:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-06 04:26:11 UTC
AV detection:
27 of 47 (57.45%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

7z 2a70e57bb5d44d2442d764beb6069cecbbba77e5a660eabbfb798784a6ade754

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments