MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ba81bdb3f1e33c02fae898b68aee60c813bb50b94cf3be3fe15c37192bc714f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | ba81bdb3f1e33c02fae898b68aee60c813bb50b94cf3be3fe15c37192bc714f6 |
|---|---|
| SHA3-384 hash: | f34ebb6b4a1c76171c487a71bd7bedc4dbcb816d32e6f78551f7f4f6431017a774720c5430c8dd089bee67ddcc015776 |
| SHA1 hash: | af3d7b4ac1f41b2c32bf6440133cad55777e49ce |
| MD5 hash: | aba3bd0f7e778d64fd63b8ea1b18b458 |
| humanhash: | bluebird-virginia-magazine-nitrogen |
| File name: | Urgent UHP RFQ E010 RFQ FOR DC UPS SYSTEM CUT OFF DATE AUGUST 25 2020_scanned from a xerox multifunt |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'376'256 bytes |
| First seen: | 2020-08-18 12:00:49 UTC |
| Last seen: | Never |
| File type: | iso |
| MIME type: | application/x-iso9660-image |
| ssdeep | 12288:RXsBtEOCzcNzJAdPc7Gr0tZ6Ym7MudwVv2Fkb39IM6cDNQXqmZC:mIcNUZw6YESt39IncQXqmZC |
| TLSH | C555D02232D4961DD17917368D8A530C03BABC066521DAD97CDF32294E3DBDBDB226CE |
| Reporter | |
| Tags: | AgentTesla |
abuse_ch
Malspam distributing AgentTesla:HELO: server.ipmi-cg.com
Sending IP: 89.223.126.111
From: LEE JUN WOO <angalos@hec-kr.com>
Subject: URGENT [HYUNDAI MOTOR CCPP] DC & UPS SYSTEM / RFQ Issuance / Cut-off date : 2020-08-25
Attachment: Urgent UHP RFQ E010 RFQ FOR DC UPS SYSTEM CUT OFF DATE AUGUST 25 2020_scanned from a xerox multifunt (contains "URGENT_U.EXE")
Intelligence
File Origin
# of uploads :
1
# of downloads :
58
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-18 01:25:05 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.