MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 39428bea5cbcd85caa9c709634192b4dbe4270b3b55f5698b4af0176715dbeb1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 39428bea5cbcd85caa9c709634192b4dbe4270b3b55f5698b4af0176715dbeb1 |
|---|---|
| SHA3-384 hash: | ec11a0dc5c08d9bc5fc5462817144a094b7d8362f252c850994b5866540e95a8a8f9e983354d151ad0630c010e937c6b |
| SHA1 hash: | 2e2cb0f822b1bb4e56ce1ace6c0e6cd7050d354d |
| MD5 hash: | 2e63d41a6c3f6bd813113db33cc36682 |
| humanhash: | low-nine-bulldog-freddie |
| File name: | PO1228pdf.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 760'019 bytes |
| First seen: | 2020-12-27 07:42:48 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:5oZYUCm1mER/+XKmkMkIwLEEajafWxsTH4S3CrAb2wC99njkb2R55JF+J4c5Y:5xUtVEXKmkMhzLUHLC82wY9j62R5H4Bu |
| TLSH | D6F433C4A369716912B8EDA6BC758DCED3C1A2F33DE4C3555CA9E688F7085389CB410B |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: localhost.localdomain
Sending IP: 123.200.19.3
From: sunaree.pon@richmilbon.co.th<sunaree.pon@me.net>
Subject: Re: Sample Order.
Attachment: PO1228pdf.rar (contains "PO1228pdf.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
304
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-27 07:43:06 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.