MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 919c8c3c74870f29cc73de80063d64d945dc9884d7cb00bcf010f629ffbf42f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 919c8c3c74870f29cc73de80063d64d945dc9884d7cb00bcf010f629ffbf42f6
SHA3-384 hash: 4d501f59f58f7acd7c4e4a671aac072d5cda27cc40c6e5ce144bef2ca96009b90f35a7d595eba1611484e8f7031a9ffd
SHA1 hash: 5f76fa197687452209f70b7aea13a680be82bed2
MD5 hash: ffce605283d8cda0dbcba501cc2cbab2
humanhash: item-island-charlie-snake
File name:PO.pdf.z
Download: download sample
Signature AgentTesla
File size:431'635 bytes
First seen:2020-07-07 09:20:28 UTC
Last seen:Never
File type: z
MIME type:application/x-rar
ssdeep 12288:+PADZzIBcPAX2fLpImgTrhccsKOV3ggKjU:+PAVzIqIXYtImgnhITh
TLSH 9B94237E8A6832EAF85C04C16FB7930F1799D44B3C0D29A9DF523C7958C2807A756DE8
Reporter abuse_ch
Tags:AgentTesla z


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: yandex.ru
Sending IP: 95.211.208.58
From: Export<ac.general@yandex.ru>
Subject: PO for July
Attachment: PO.pdf.z (contains "PO.pdf.exe")

AgentTesla SMTP exfil server:
smtp.yandex.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-07 09:22:05 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

z 919c8c3c74870f29cc73de80063d64d945dc9884d7cb00bcf010f629ffbf42f6

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments