MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 773dd5de111436f2c42049b35310f0be36bf92e84c2ebcee57c85777b1504bd0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 773dd5de111436f2c42049b35310f0be36bf92e84c2ebcee57c85777b1504bd0
SHA3-384 hash: 4acdb0fb457642d26abd598f8213ffe368498c32fb94ef58aa511cee636b378ffba4c1b5ff16757e672bf7068b46abe8
SHA1 hash: 229ba4d2458c2ed21cf2fac7510ff9a95611d45b
MD5 hash: 96ceb1b4a6fb451923125fefaa20282f
humanhash: magnesium-beer-seventeen-sierra
File name:Pallex ITALY_74648 PO.doc - Copy.rar
Download: download sample
Signature AgentTesla
File size:402'316 bytes
First seen:2020-05-11 08:54:34 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:hS21pEQhOfVk6MTXHbGD/kUOZXcBvX0ETlSqzmRU5gvAl/qbfyKNeiKcZgP:nfEQh2m6K7Mk6v58qKyG4HyeiKLP
TLSH B78423FE07B8E273DD841461A5048ADD73754ED04DB9D0B7BE713D0A2B81882FAA625E
Reporter abuse_ch
Tags:AgentTesla rar


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: 78692.mit-digital.com
Sending IP: 49.50.67.93
From: Alejandro-Pallex ITALY <bikram@budgetlogistics.net>
Reply-To: Alejandro-Pallex ITALY <pallex@italymail.com>
Subject: Re: inquiry - PO QX 3746_ITALY..
Attachment: Pallex ITALY_74648 PO.doc - Copy.rar (contains "Pallex ITALY_74648 PO.doc.exe")

AgentTesla SMTP exfil server:
premium57.web-hosting.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-11 09:36:32 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
18 of 48 (37.50%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar 773dd5de111436f2c42049b35310f0be36bf92e84c2ebcee57c85777b1504bd0

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments