MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6dfb2f08b1e0983aad892a18ebf525ac2a63a06d3b34b417f0c6fd9be07d417e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6dfb2f08b1e0983aad892a18ebf525ac2a63a06d3b34b417f0c6fd9be07d417e
SHA3-384 hash: ea8056ac9dd46d5b204a751e41578f6c495989c0faf2438ba6a07c2b0400150e979d32de168a1a99181890b2cc71eedb
SHA1 hash: acf18d9624c6056cd7c8152d1028027a0b4e1c3a
MD5 hash: 3cf64c5b08e12b247ceadb9b39d7defb
humanhash: fanta-maine-cola-west
File name:ABB offer 02.5.2021.abb.pdf.rar
Download: download sample
Signature AgentTesla
File size:799'936 bytes
First seen:2021-02-05 06:27:26 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:xNIqtaOAzNIPIW4hmhegVA5DMD4rty13F:XIqY56PIPfRKDeM11
TLSH 6C0533F95110E0271FA7035369A85E17A35491D8CF1883D631E4E3F8A6BF8E4C59CAFA
Reporter cocaman
Tags:AgentTesla rar


Avatar
cocaman
Malicious email (T1566.001)
From: "Serob Hakobyan <serob.hakobbyan@horizon-service.am>" (likely spoofed)
Received: "from horizon-service.am (unknown [104.216.251.52]) "
Date: "4 Feb 2021 21:57:58 -0800"
Subject: "HA: NTS Gerorgia"
Attachment: "ABB offer 02.5.2021.abb.pdf.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-05 05:09:05 UTC
File Type:
Binary (Archive)
Extracted files:
16
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 6dfb2f08b1e0983aad892a18ebf525ac2a63a06d3b34b417f0c6fd9be07d417e

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments