MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 739cbd3e429c083b5fb5fb408329e60ae5e3bf52b6fd4d7408a47b6584946962. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 739cbd3e429c083b5fb5fb408329e60ae5e3bf52b6fd4d7408a47b6584946962 |
|---|---|
| SHA3-384 hash: | 8f870c50f0c80ce8faf00d5bee712ac97f477f197babdaab5d59c63c215c56dde698eda282656bf01d35fbda8b23333b |
| SHA1 hash: | b5810fea9463f2eb8b30f4e2c2d7d276e64486b6 |
| MD5 hash: | e6fb0c908fe4412bad67e1f478ad05c8 |
| humanhash: | maine-blossom-network-oven |
| File name: | Purchase order for x-supreme 800 spar parts and standers.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 183'411 bytes |
| First seen: | 2020-08-13 07:48:12 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 3072:6LFhdy03ajhsj3CVqgXq81FV5Tp/5oczaet9LFHGdO9Y04T6PFKkc9Sm:6LFhQvlcCzqMLjxaejk49rgEYTSm |
| TLSH | 7F0423E9682062A020D5DB5EF98AC777A4B1ED20CED8F3079E174DD349DB6439B61EC0 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: server.example.com
Sending IP: 62.171.146.191
From: VKG Auto Parts ENT <hkhalil@iswebnumerique.com>
Subject: Purchase order for x-supreme 800 spar parts and standers
Attachment: Purchase order for x-supreme 800 spar parts and standers.rar (contains "Purchase order for x-supreme 800 spar parts and standers.exe")
AgentTesla SMTP exfil server:
accounts@multilprollc.com:5
Intelligence
File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Infostealer.Agensla
Status:
Malicious
First seen:
2020-08-13 07:50:06 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.