MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3603db80c35f018259f86d54709e08d952495fe4411922bb4c9b2ae5e1762f15. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 3603db80c35f018259f86d54709e08d952495fe4411922bb4c9b2ae5e1762f15 |
|---|---|
| SHA3-384 hash: | b2ac756c3c5db78644b7f178441d88993e118cfe16c66cad0280f951d53b088010ef2dd0c0710d553149e801bc93269c |
| SHA1 hash: | 3c54dcac5c7ba3c9ed9998e46ac4922959a16753 |
| MD5 hash: | 01324c13cd5c7e9878f53055baa2b29a |
| humanhash: | kilo-oregon-idaho-quebec |
| File name: | Work Specifications.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 561'802 bytes |
| First seen: | 2020-08-03 14:01:32 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:DbJuBI+8vPmkuGQYYSgWGyQMfhbcoUO6Q22LSlvE8KLAeQ0F:DbJuN8JkJSYyQ2hby43UvEvLAB0F |
| TLSH | E5C423DC8D04DAAF61DBD24DEA8DF7FC2F0A139DE18E6E1A740F1199D4A04784697C82 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: sibylinecornt.com
Sending IP: 95.211.208.58
From: SIBYLLINE TRADING & CONTRACTING W.L.L. <info@sibylinecornt.com>
Reply-To: engineering.stc@sibylinecornt.com
Subject: RFQ Service Road and Boundary Fencing Work / Metal work
Attachment: Work Specifications.rar (contains "Work Specifications.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-03 14:03:10 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.