MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4327e9171a4742ffbc4d2151489933aeece162ef9a8133ba87d7db5372ffedbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 4327e9171a4742ffbc4d2151489933aeece162ef9a8133ba87d7db5372ffedbb |
|---|---|
| SHA3-384 hash: | 68b871d57e12e8439c031ba533e27f4c5a03679abd8782fb55f572b879a2979fe943041dc5b468e32d240f9d42a68a47 |
| SHA1 hash: | d478fc6f2b71cb65d93ca43593b3f625f01572f2 |
| MD5 hash: | d86752a59c0df130d990e6638867d1a9 |
| humanhash: | lion-sodium-batman-alaska |
| File name: | payment_swift_039403_po0232.r01 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 808'815 bytes |
| First seen: | 2020-09-02 06:18:23 UTC |
| Last seen: | Never |
| File type: | r01 |
| MIME type: | application/x-rar |
| ssdeep | 12288:DfaEUpQjK/L6RaeDjBRPDKqrkon+0+t2ZPXp2CI4yFtUqqciIBpfehhk3nWUQD:DlUkKCaefB1rZkMxiRFt5qAy4GUe |
| TLSH | 630523582F5E9C9626FFD53B1732EBE588839EDCBFB9D50ABB8469CC061023108654CD |
| Reporter | |
| Tags: | AgentTesla r01 |
abuse_ch
Malspam distributing AgentTesla:HELO: uaeenterprisesgroup.ae
Sending IP: 156.96.118.47
From: Nirmalan <nirmalan@uaeenterprisesgroup.ae>
Subject: Payment confirmation- Rfq:002732.
Attachment: payment_swift_039403_po0232.r01 (contains "payment_swift_039403_po0232.exe")
AgentTesla SMTP exfil server:
smtp.yandex.com.tr:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Infostealer.Agensla
Status:
Malicious
First seen:
2020-09-02 05:47:42 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.