MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a313a4cc6a694593e99b16fa1ab12f5885f0321aebecca7a41d671447c64f0c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 6a313a4cc6a694593e99b16fa1ab12f5885f0321aebecca7a41d671447c64f0c
SHA3-384 hash: b420fd85e4cabe87670432d604cdc68778a602ac7285645c93bc7b79d28e3869d62d7d7e1bf496c3a641f22f8893ecad
SHA1 hash: 8d423cf6c82d40dc21f756f769ae0d94165cbfa3
MD5 hash: d23b519648d15081b2c1fc52cdb51d60
humanhash: magnesium-mountain-missouri-arizona
File name:Ref-MT103-Payment-Priority-Customer-Ref-Ref-CCB99002992220420.img
Download: download sample
Signature AgentTesla
File size:501'760 bytes
First seen:2020-07-10 17:00:29 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 12288:476h5RBsFit7+TcKbZqVgmRW6ZbCRJh9gzLnFo:3IeUzboimzZmB
TLSH DFB4F18832B477AFD47BD3F58A601C24A731756B8717D20AAC5710DE6A5DB82DF00AA3
Reporter abuse_ch
Tags:AgentTesla img


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: basictool.com
Sending IP: 5.101.151.56
From: account.payable <accounts@alberta.com.mt>
Reply-To: info@dennisbearman.com
Subject: FWD: Outward SWIFT copy for your transaction submitted to us - Ref No – 001BM52201530017
Attachment: Ref-MT103-Payment-Priority-Customer-Ref-Ref-CCB99002992220420.img (contains "Ref-MT103-Payment-Priority-Customer-Ref-Ref-CCB99002992220420.exe")

AgentTesla SMTP exfil server:
smtp.tpts4seed.net:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-10 17:02:06 UTC
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

img 6a313a4cc6a694593e99b16fa1ab12f5885f0321aebecca7a41d671447c64f0c

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments