MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5db7e93f0af5824b3f1fdff33ccdcc388385a689adeab525ef31986e8b893590. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 5db7e93f0af5824b3f1fdff33ccdcc388385a689adeab525ef31986e8b893590 |
|---|---|
| SHA3-384 hash: | 0c0edde958c30aa0a4ad10d99beb129a931ed055a88810a99a9815491226138eb0eca0615e8c7349c502d968005d64ae |
| SHA1 hash: | 715a7345b9f6175e9cbd6824adefc193926b1ff6 |
| MD5 hash: | 7c26ee4bf6475094294d7709547683ce |
| humanhash: | artist-arkansas-zebra-mobile |
| File name: | inquiry_Order_sep_2020_0000038482,pdf.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 589'232 bytes |
| First seen: | 2020-09-02 06:13:10 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:XXkk5q6EomhL8lLbEaGTMp5GsCkURB7kwCY/+54N9rb+:X7cLJL8qDCeaw5+GNt+ |
| TLSH | 2CC4235BB957450BEB236CF200EF23D841C43D6FA07CA8DBD65EE01DA970BB25016D9A |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: kxv0.wiamxvii.ml
Sending IP: 128.199.17.214
From: Ursula Schiele <ursula.schielee@wiamxvii.ml>
Subject: Rice Order Inquiry
Attachment: inquiry_Order_sep_2020_0000038482,pdf.zip (contains "inquiry_Order_sep_2020_0000038482,pdf.exe")
AgentTesla SMTP exfil server:
mail.spamora.net:587
AgentTesla SMTP exfil email address:
sales@jiqdyi.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-09-02 05:24:48 UTC
AV detection:
13 of 48 (27.08%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.45
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.