MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b51211010c189b8157784a6b03e1ccdccce766cc459a5d0d9b8058ee27f938c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: b51211010c189b8157784a6b03e1ccdccce766cc459a5d0d9b8058ee27f938c5
SHA3-384 hash: 4889eefe8d6ffc4fedb7c44ee59f704da8de0938f37eacfb17065dfa58069fe59fce66e87af66387b88bae4a4ec703c9
SHA1 hash: f905e4e6245c4346ae08c65f4874af9cc26dfe8e
MD5 hash: 85905f1b6948e597b92789b17276fe63
humanhash: river-yankee-autumn-missouri
File name:LDR Ts and Cs June 2020.Payment reference.rar
Download: download sample
Signature AgentTesla
File size:447'738 bytes
First seen:2020-08-05 06:31:10 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:vvUlMBdsAufz6YVzKIpC2ovVjaml210itVpSFlTYjRbqXzrPAw6WxVb9bloG:nu766z25vVmml21wRcNqHoezbT
TLSH 7594231E53B9E3D1E5C2B450B8D3CEBE43869621578D3A927B32F04E5E706724582F35
Reporter abuse_ch
Tags:AgentTesla rar


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail.einihutintl.gq
Sending IP: 161.129.67.162
From: Thobela Mqikela<Thobela.Mqikela@absamail.co.za>
Reply-To: <annewilegama@gmail.com>
Subject: RE: FW: PROFORMA#378-03.06.2020
Attachment: LDR Ts and Cs June 2020.Payment reference.rar (contains "LDR T's and C's June 2020.Payment reference.exe")

AgentTesla SMTP exfil server:
mail.mycheaprentals.com:587

AgentTesla SMTP exfil email address:
account@mycheaprentals.com

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2020-08-04 19:38:02 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar b51211010c189b8157784a6b03e1ccdccce766cc459a5d0d9b8058ee27f938c5

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments