MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8cfc18637e87b114b65f90e633d4f6049f7d3366eefd776eec519fd93e5218bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 8cfc18637e87b114b65f90e633d4f6049f7d3366eefd776eec519fd93e5218bd |
|---|---|
| SHA3-384 hash: | 0b413f0b5b36395b8c0c9e6cfe4d8e190bda97c7739371adf2e795f1ce1c202bed6c6544afe65c859cb7b7005f56bcff |
| SHA1 hash: | dd3a0ab7496c86c5dec4f15071f4fad36675bccc |
| MD5 hash: | 34c91402eabf97c190e5e318d5f114ef |
| humanhash: | grey-mike-rugby-delta |
| File name: | hesaphareketi-01.pdf.z |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 528'652 bytes |
| First seen: | 2021-03-17 06:58:40 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:vX35Xe+JW+ldgZ8FgY3JRYRfyUJu4ZvJb0B+LWw+Is32YC:vX35JYG34fHPb3Lwv32YC |
| TLSH | DCB423B52BCC56EA05519B14B0B972029EB19C327B94689C32A4DE06DAF1943CFCDDFC |
| Reporter | |
| Tags: | AgentTesla Garanti geo TUR z |
abuse_ch
Malspam distributing AgentTesla:HELO: mail42.im02.ada.net.tr
Sending IP: 195.112.154.42
From: Garanti Bankasi <ekstre@garanti.com.tr>
Subject: Hesap hareketleriniz
Attachment: hesaphareketi-01.pdf.z (contains "hesaphareketi-01.pdf.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-17 06:59:05 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.