MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 67b453b1c497027d2c0e73ff76e0136315ceccad2594021f2eb5e0d56c564d91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 67b453b1c497027d2c0e73ff76e0136315ceccad2594021f2eb5e0d56c564d91 |
|---|---|
| SHA3-384 hash: | 04506a97bbfb5f2689c9eb3f63034b78a9beb87eea0cd7c2d88a10c4ab88215075b42bfcc8ce584ca45853cb314a8c6c |
| SHA1 hash: | 30670f90aa5e15206dcd8511015d048b083b2ecb |
| MD5 hash: | 9b98506f153096719b4c9a70b813fc22 |
| humanhash: | butter-fix-black-fix |
| File name: | QU-09273.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 317'344 bytes |
| First seen: | 2020-12-08 07:55:02 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:qhti7KiIxQWHtlUJTzA8Vd0fbPgJ4pqfv/lmvXJMqpGpJG0PjmltJThF4UeE5EcB:AivgQWH6Td4bPg442JXEzPjmNeE5EcB |
| TLSH | B66423A31479814E371AC0FD1BAFEE3E8F2B17645CE25A562C95B6B8C78394FD4C8016 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: 167489.MONOVM.COM
Sending IP: 193.56.255.161
From: purchase01@bualtd.com
Subject: DEC. QU-#09273
Attachment: QU-09273.rar (contains "QU-#09273.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-12-08 07:41:48 UTC
AV detection:
6 of 48 (12.50%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.