MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65860d0a646d04a02071464cb18738e8c9f8e029be1c7f5ff3db4652cece7618. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 65860d0a646d04a02071464cb18738e8c9f8e029be1c7f5ff3db4652cece7618
SHA3-384 hash: 58d6369ffdfc4c3e712163262f8c4c201235bd11f90b67867bcc9787f4b316116e388333d52b30b568d3e93220c741ea
SHA1 hash: ff84c4ab44d637b63fa1ec0c497804431ab365ea
MD5 hash: 4513c2dba051f13dda14de8d3105b26f
humanhash: floor-rugby-lion-gee
File name:proforma invoice.r00
Download: download sample
Signature AgentTesla
File size:757'062 bytes
First seen:2021-06-28 05:21:32 UTC
Last seen:2021-06-28 05:23:42 UTC
File type: r00
MIME type:application/x-rar
ssdeep 12288:xkvDl8J4SDEO7rdESfjlbs0K5yrWvJnils+CQnPvtgPo5XjWMoczKFIDXrauj:xilK4fO7BES56mWZiNnXIUXyYXOuj
TLSH DBF433CF2B939B43686A7770887FD08BF7181AAD51C2A541A774043AC64377CFA639E4
Reporter cocaman
Tags:AgentTesla INVOICE r00

Intelligence


File Origin
# of uploads :
3
# of downloads :
152
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-28 01:55:23 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
11 of 45 (24.44%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r00 65860d0a646d04a02071464cb18738e8c9f8e029be1c7f5ff3db4652cece7618

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments