MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b8f654dc4db8fb88a702639d4bab7350d2762507ecc4a40e93672b9f2ebde0a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b8f654dc4db8fb88a702639d4bab7350d2762507ecc4a40e93672b9f2ebde0a3
SHA3-384 hash: c1b150031665182e96eb8ce8a5bc8f1b08b98b278ac88cb260b2e9bdb6f75ee1c341c1f001c2c46060c6110649bad2ca
SHA1 hash: 3dee9cf7922083c8710bc23dc1c0251f23bb9af4
MD5 hash: 4eebbc3af7d73d6cc73a1bd2bc6e0475
humanhash: equal-neptune-alpha-mockingbird
File name:NEW ORDER FROM AUTONOLOGY CO.,LIMITED_PO#7A68D20.pdf.ar
Download: download sample
Signature AgentTesla
File size:588'318 bytes
First seen:2021-02-04 13:01:09 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:gu9TJNARrhehDVh+0EGWyVy+vNwL4BA1rY6IUMKnIDuSGJnJqv4JoMN:ddWZhe5V40EGWyggNwL4BeAUM4gHwJeS
TLSH 10C42348666E2845B68A00E7CBFD64E1A1973CCCD27A089FC297FDDC5E766C85CC910C
Reporter cocaman
Tags:AgentTesla ar


Avatar
cocaman
Malicious email (T1566.001)
From: "Merin Shibu <sales@autonologytool.com>" (likely spoofed)
Received: "from autonologytool.com (unknown [103.133.107.38]) "
Date: "04 Feb 2021 04:06:12 -0800"
Subject: "NEW ORDER FROM AUTONOLOGY CO.,LIMITED_PO#7A68D20"
Attachment: "NEW ORDER FROM AUTONOLOGY CO.,LIMITED_PO#7A68D20.pdf.ar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-04 10:17:48 UTC
File Type:
Binary (Archive)
Extracted files:
16
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar b8f654dc4db8fb88a702639d4bab7350d2762507ecc4a40e93672b9f2ebde0a3

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments