MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a114e50c63852e8660b470d58cf2373ab99931804c463a4cc5c51c0e3ecc5272. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a114e50c63852e8660b470d58cf2373ab99931804c463a4cc5c51c0e3ecc5272
SHA3-384 hash: c5a13930ba56e8eb301b17e1180f033f33046117804818fdbdc14f3100c0dec2194fffba40f559d64d8ef6a03bd718d8
SHA1 hash: 6bdf29222ae2aea79a8c2a84d41eb8f42f00324d
MD5 hash: 45cd282a4c0c4dd98585d53ec7cd3538
humanhash: batman-alanine-victor-saturn
File name:HSBC01984755332678_pdf.GZ
Download: download sample
Signature AgentTesla
File size:628'855 bytes
First seen:2020-12-27 07:45:29 UTC
Last seen:2020-12-28 06:49:08 UTC
File type: gz
MIME type:application/x-rar
ssdeep 12288:PJpz8cCyT8JqvL3HrjHWj0XREiX4SZp2GFLjRNLOHnGKMvzrf:PJh8SBvL3Hn2EREioSZpb3RpaGzvf
TLSH 2BD433A183022081695A5FAC33A6CFC5C462034FDB78F7E77E2EB526937645EC5492CB
Reporter abuse_ch
Tags:AgentTesla gz HSBC


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: google.com
Sending IP: 172.107.194.103
From: HSBC Holdings Plc. <googlealerts-noreply@google.com>
Reply-To: HSBC Holdings Plc. <googlealerts-noreply@iigoogle.com>
Subject: HSBC01984755332678: Copy slip
Attachment: HSBC01984755332678_pdf.GZ (contains "Scan copy slip_pdf.exe")

AgentTesla SMTP exfil server:
mail.itzayanaland.com:587

Intelligence


File Origin
# of uploads :
3
# of downloads :
299
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-27 07:46:06 UTC
AV detection:
19 of 47 (40.43%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz a114e50c63852e8660b470d58cf2373ab99931804c463a4cc5c51c0e3ecc5272

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments