MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 34f178da59cb5457149a785d73576526d5c034e153a14b4715ac0bb7da02cd1d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 34f178da59cb5457149a785d73576526d5c034e153a14b4715ac0bb7da02cd1d |
|---|---|
| SHA3-384 hash: | 2a93dae2baecd8b273029bc213feeb646a11acf0ca674c7f75f577e71aa7ba60708d3c8db5fac6939f3502ae2973b38e |
| SHA1 hash: | 43161c9b7f9b24fcf515846e03c4e04da962a2bc |
| MD5 hash: | 0f8c7fda0ab6eeec9f540beeca30d449 |
| humanhash: | winner-social-emma-august |
| File name: | facturas y datos bancarios.PDF____________________________________.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 526'054 bytes |
| First seen: | 2020-07-21 15:36:31 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:K2wPP9nLuhmWvOgb6RxPJElgc3VtgoNyoWCnrEJuOn09k:K2wtn4FvOYsElgcrRNSkgvR |
| TLSH | F3B423E3723B799CF02DE33B626F9A8D75A838D5C146D2D19894D0FC9A53E8D6203178 |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: hosting-02.telecentro.com.ar
Sending IP: 190.55.60.123
From: PAGOS Karina Hernandez <pagos@grupodiaz.com.mx>
Subject: RV: Pago vencido para mayo y junio (SOA)
Attachment: facturas y datos bancarios.PDF____________________________________.gz (contains "facturas y datos bancarios.PDF____________________________________.bat")
AgentTesla SMTP exfil server:
mail.arigmed.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
66
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.MassLogger
Status:
Malicious
First seen:
2020-07-21 15:38:09 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Unknown
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.