MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 812528cb885f8298262852c6b6deb3c91080195965f9c974d36aa96069d83bb9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | 812528cb885f8298262852c6b6deb3c91080195965f9c974d36aa96069d83bb9 |
|---|---|
| SHA3-384 hash: | d80a1eb82c206ee71669e5432a8b7ad484e1ec5795dfa397a9ca87a584c45873b357b1d9c1be4c194f1c3741b1aff935 |
| SHA1 hash: | 5718725ecddb050275bf9969cda2a692da63d6d1 |
| MD5 hash: | 4d365596f117e73e9ec51de565e0851b |
| humanhash: | mike-mexico-washington-fifteen |
| File name: | transferencia.PDF_______________________.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 526'938 bytes |
| First seen: | 2020-08-13 05:53:58 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:HGA2hxMjWhI/ktPJXcoinMWX3Lt/bBXdtL8tORvP/bn2tHgR:CxMr/aPJEXZbvtL8tOJP/zqAR |
| TLSH | 31B42323632833DD261D6F336245E58B652A66DE7BF20B64FD19084BD4E28A540FBCF4 |
| Reporter | |
| Tags: | AgentTesla gz |
abuse_ch
Malspam distributing AgentTesla:HELO: vps.wadilworks.net
Sending IP: 66.7.203.16
From: Lucian Grigore <lucian.grigore@rd-enginery.ro>
Subject: ***SPAM*** Registro de Cuenta Interbancaria en Dólares
Attachment: transferencia.PDF_______________________.gz (contains "transferencia.PDF_______________________.bat")
AgentTesla SMTP exfil server:
mail.emifarma.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Spyware.Datacollectora
Status:
Malicious
First seen:
2020-08-13 05:55:09 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
2/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.