MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4495915fbe3a2809b7124d48f24dd81e2bcf661bf2c0086c22e8e20887fd1ebb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 4495915fbe3a2809b7124d48f24dd81e2bcf661bf2c0086c22e8e20887fd1ebb |
|---|---|
| SHA3-384 hash: | a1d15cb017dea82c8414300043cbc62a6e721ce6ba9ccc81c4d7e4deda3f88ba0126330f62055a2edce2f298ee97c73c |
| SHA1 hash: | 283ccfd2cf1c36e8630a0f462e96d561fcb80149 |
| MD5 hash: | 3a5b167bed65054e30aa4958db81b6ad |
| humanhash: | robert-tango-south-zulu |
| File name: | NB200024.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 445'284 bytes |
| First seen: | 2020-12-20 12:11:08 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:o9vP1MOAuNIRrgw9yZukKoBxbWKQq3OcD4ecPFoFBq47oZn2kqEwIuIZd6Gi0a:wvPSOIp59kukKkqqV8zNEqD9Oukd |
| TLSH | 2A942380F9F43056EBED23CBDD78C2D6A01622BFB852545D84A856CDF756231E313B88 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: slot0.greunlight.com
Sending IP: 45.85.90.169
From: Sofia Senserini <office@greunlight.com>
Subject: Laca Trade
Attachment: NB200024.zip (contains "SZ360 ORDER TW200667 Laca Trade Srl BZ 19 MTR.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
198
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-20 12:12:05 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.