MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 655890cbf775e8d1c151b7556498122955db7e3655aea0ee09d17747e50bdd0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 655890cbf775e8d1c151b7556498122955db7e3655aea0ee09d17747e50bdd0e
SHA3-384 hash: 6be72d1c1771a7821edd252cfd9da06d6c4f7a3e0d98d7b29b40e552704566bf1aed642a103f7e18e5e116c734558dc1
SHA1 hash: 19aca3d30813940c29f8dbf12fcdddc285fe01ce
MD5 hash: bedc32f0a0a344e9c718b38fe7301ebb
humanhash: texas-quebec-kitten-stream
File name:CardFinans09000.tar
Download: download sample
Signature AgentTesla
File size:401'578 bytes
First seen:2020-12-28 08:00:52 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:mX9tRb30R5BD3qLbNbYr1sZVqOceMfFfhFBBTj9otYbVBoar499fd0lRspWbWR3y:MtD0vxq9sr1eV7MXBZsaryd0oYqbeahM
TLSH 4C84236E8B5A7D53DD75846FC64F6F01FC654122BCA2240FB5A036BE38AC8989C433B5
Reporter abuse_ch
Tags:AgentTesla geo tar TUR


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: hosted-by.rootlayer.net
Sending IP: 45.137.22.52
From: QNB Finansbank E-Ekstre<ekstre@eekstre.qnbfinansbank.com>
Subject: CardFinans KOBİ Visa Kasım ayi ekstreniz.
Attachment: CardFinans09000.tar (contains "CardFinans09000.exe")

AgentTesla SMTP exfil server:
srvc13.turhost.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
445
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Binary.Infostealer.Generic
Status:
Suspicious
First seen:
2020-12-28 07:18:50 UTC
AV detection:
4 of 48 (8.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 655890cbf775e8d1c151b7556498122955db7e3655aea0ee09d17747e50bdd0e

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments