MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3c29bde4317487f7e1f64f9809e7f6bad250ef5855c604f8ef03a1ae4e6aa7ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 3c29bde4317487f7e1f64f9809e7f6bad250ef5855c604f8ef03a1ae4e6aa7ce |
|---|---|
| SHA3-384 hash: | 08a8f6102b7313c1a14bddb7196e28c478a1e7f57a69249bf37b3043cd85c6b8167aa12aa568138022e6ddccc5caf12f |
| SHA1 hash: | 8a58ee61cfafea5e4e2fbb1cd477c00c3273220a |
| MD5 hash: | ddb0d4ce47dabc3045479da3296d35e7 |
| humanhash: | lima-illinois-harry-pennsylvania |
| File name: | swift copy_pdf.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 380'683 bytes |
| First seen: | 2020-10-06 06:09:54 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:EzlAaer/iSZu+HV+JSeLfZDogrO/b9MU7eZmz/0nAkCVdom3TlYCWAkC/GWmicj7:Qher/iTJSeLfinjQ4zcAkoiQpYCfL48y |
| TLSH | 538423495CE16D13715EE8BEA9EB30364ED8B5E8D4B8FB334174312BC10A0EB61AE45D |
| Reporter | |
| Tags: | AgentTesla DeutscheBank gz |
abuse_ch
Malspam distributing AgentTesla:HELO: server.devbox12.com
Sending IP: 162.249.2.44
From: Deutsche Bank <info@domilbergltd.com>
Reply-To: Deutsche Bank <rgarcia@meslto.com>
Subject: SWIFT Transfer Copy (MT103) - Ref No – 001DTOC52201532020
Attachment: swift copy_pdf.gz (contains "swift copy_pdf.exe")
AgentTesla SMTP exfil server:
mail.incrediblekenyaadventures.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-10-06 02:58:19 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.