MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 49ad6c1248007a4ac4414326163a7fffeb97b86baddb91a5ca9372aa0dc069e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 49ad6c1248007a4ac4414326163a7fffeb97b86baddb91a5ca9372aa0dc069e9 |
|---|---|
| SHA3-384 hash: | 83f6a73b7cddc9654575c936d4e0da91e2b592c5113a6c861fe1ea7ecbe4c38406107bfcd0cc9b4e427938cd3ad78bed |
| SHA1 hash: | f2fca9c26c9fe821af2c7a66c60c92067cece48c |
| MD5 hash: | cb55f54d7a84fc1fb62028375c260a9d |
| humanhash: | twelve-four-victor-social |
| File name: | PO.r00 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 368'499 bytes |
| First seen: | 2020-09-29 19:37:28 UTC |
| Last seen: | Never |
| File type: | r00 |
| MIME type: | application/x-rar |
| ssdeep | 6144:+F4dGC5gagkxKwHmZr0oGN3QG5u4Zd5dPCILrss3C3M0k9gt1uTO7Ak5s3Zt8p+Z:O6GCXPxXEdG1QleJRsLc0k9gt1Rr2ptx |
| TLSH | A074238F335923D2C465D4ADE7C869CCE64D6FFBC1EEAB4F583C421A164B491201B2E2 |
| Reporter | |
| Tags: | AgentTesla r00 |
cocaman
Malicious email (T1566.001)From: "pralhadidole@confidencegroup.co"
Received: "from confidencegroup.co (unknown [95.211.253.194]) "
Date: "29 Sep 2020 17:20:34 -0700"
Subject: "RE: Re: FW: Qty Amendment / New PO Data"
Attachment: "PO.r00"
Intelligence
File Origin
# of uploads :
1
# of downloads :
78
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Infostealer.Stelega
Status:
Malicious
First seen:
2020-09-28 22:50:27 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
15 of 29 (51.72%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.