MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8b9d67c7c061d216e0138559840fe22d7bdd705b9fbb9f643b4e1e1e4281f128. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | 8b9d67c7c061d216e0138559840fe22d7bdd705b9fbb9f643b4e1e1e4281f128 |
|---|---|
| SHA3-384 hash: | 1c1c3411db4385b07dbbc25ab6c5593667e7873cecdb356e0b740f57370cd61e6a00885242f27f6b918593534bd92dc4 |
| SHA1 hash: | b77182c0de3a4a9dbd908c2c1a92641043cf7ab8 |
| MD5 hash: | 5ddedec2fdade672292a0e82526261fd |
| humanhash: | stairway-johnny-gee-kansas |
| File name: | 240-20201013-887387-MT103.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 559'154 bytes |
| First seen: | 2020-10-13 07:19:34 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:nqOFAh0OrWlzXrBzyTNnvXavsuHrLf3PCLoCsqIstMH:n2Kce5zyTNnPiLD/CsItMH |
| TLSH | 72C423B4402F3874F5E74AB28AA2A605EFF2304B9252EC3BF05FC60792E470B4D9655D |
| Reporter | |
| Tags: | AgentTesla HSBC zip |
abuse_ch
Malspam distributing AgentTesla:HELO: hsbc.com.hk
Sending IP: 91.132.139.169
From: The Hongkong and Shanghai Banking Corporation Limited (HSBC) <customerservice@hsbc.com.hk>
Subject: Re: Bank Transfer Notification
Attachment: 240-20201013-887387-MT103.zip (contains "240-20201013-887387-MT103.exe")
AgentTesla SMTP exfil server:
smtp.foxmalil.com:587
AgentTesla SMTP exfil email address:
logs01@foxmalil.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Taskun
Status:
Malicious
First seen:
2020-10-13 03:36:49 UTC
AV detection:
23 of 48 (47.92%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.