MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b9cfcd57369b73ef5fd1c561b0f7e2bf836de911e09fbbf6a51f162bd7cad53d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b9cfcd57369b73ef5fd1c561b0f7e2bf836de911e09fbbf6a51f162bd7cad53d
SHA3-384 hash: 4e74c65bd06bc5fb07acaf04c74deb4b377d36644447154a9461445ba417e804e2c9ede2758bf1cba2cee25552433288
SHA1 hash: e5a8a4978562a016561005a422342d04f3eef104
MD5 hash: e98924be7fc6534d492d5622a81dc257
humanhash: texas-december-ceiling-king
File name:P-O.zip
Download: download sample
Signature AgentTesla
File size:891'378 bytes
First seen:2020-10-12 19:32:00 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:2ZDwbg1JgqxIKFSObnHE8kOYbJVnYqhFSWQvvpczYc:wGRKcOjHE8kTJ6WSWQvRcd
TLSH 111533D9974986E2DB2E56B3FF92230DE01291E1628D5C63953CE723988EC57930E339
Reporter abuse_ch
Tags:AgentTesla zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: glohotels.fi
Sending IP: 185.222.57.73
From: Accountant<sales@glohotels.fi>
Subject: FW:Re:Re:Re:P/I
Attachment: P-O.zip (contains "P-O.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2020-10-12 14:27:05 UTC
AV detection:
4 of 48 (8.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip b9cfcd57369b73ef5fd1c561b0f7e2bf836de911e09fbbf6a51f162bd7cad53d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments