MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7a2c3b87c0bca6657f075e056b70350b5a2ea657fc2f2876c16fe70fc217098e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 7a2c3b87c0bca6657f075e056b70350b5a2ea657fc2f2876c16fe70fc217098e |
|---|---|
| SHA3-384 hash: | d8b85433149e91bf0df739bb5041dcb81c351b855b8f7096d17381a5fac6c893ca9172ebde2defa45b32ef500d4d69b9 |
| SHA1 hash: | ba2082dd36e2b779851d425c4f5ff77095b8e717 |
| MD5 hash: | 62d456093185a9171e10f1d139bcacfe |
| humanhash: | golf-apart-arizona-berlin |
| File name: | Salary_PMT.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 617'597 bytes |
| First seen: | 2020-12-03 08:36:18 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:iKf459kf/kNx6hgTR0Zv5t79UcfZYRqOwdU/5LeSEbD:dGkf1a8vzi3/5LID |
| TLSH | FED423E6C3CC056D84224017972A58127DEF49C3CE4D1D1A6FEF9B49AA815C3AAFDC93 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: server.2080technologies.solutions
Sending IP: 198.255.54.42
From: Human Resources Manager <HRManager@hrm.com>
Subject: YOUR EMPLOYMENT STATUS
Attachment: Salary_PMT.zip (contains "Salary_PMT.exe")
AgentTesla SMTP exfil server:
smtp.oiltechnd.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-03 08:37:04 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.