MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4fd4e43c38eeef1f98a50b5938188bc5fe86cd3aeba8553300097fd8732b3dfe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 4fd4e43c38eeef1f98a50b5938188bc5fe86cd3aeba8553300097fd8732b3dfe |
|---|---|
| SHA3-384 hash: | 3a8db10f1e913e0d40c526cb60738f2f55d46fb987965ca32739ef044910b53debc9646bedef92b99d614e4c43f24040 |
| SHA1 hash: | db1b1f2ed8990d2bc32ff33348dce7e0eabbaa2c |
| MD5 hash: | 5bdea44382cfa378dc195cfaa676a9b4 |
| humanhash: | ink-alabama-oxygen-double |
| File name: | Purchase order.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 805'324 bytes |
| First seen: | 2021-03-16 13:09:34 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 24576:MJ/1beiCUyYvMufbn1KbZYdPQ0PNXw12dJxWfIv4CHgs7rUSt:M9xmuT14w9PNkkJo/CHgWrUSt |
| TLSH | DD0533D3E1A55DF9C0F9F2728E60E87AFB4BE34028E5C93F46E5F6321606E809710196 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: 4gvps.4gvps.com
Sending IP: 38.135.39.46
From: info@goojli.com
Reply-To: gregoryryan001@gmail.com
Subject: New Order
Attachment: Purchase order.zip (contains "Purchase order.doc")
AgentTesla SMTP exfil server:
mail.privateemail.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Threat name:
Script-Macro.Trojan.Sadoca
Status:
Malicious
First seen:
2021-03-16 13:10:07 UTC
AV detection:
12 of 47 (25.53%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.