MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 baea804fbfc84e13d6eee5f86ded07081ee5c59f0dfa2e94aa55b286e5e78f89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | baea804fbfc84e13d6eee5f86ded07081ee5c59f0dfa2e94aa55b286e5e78f89 |
|---|---|
| SHA3-384 hash: | db01758cade21c4fdb2a7c23d93fffc4c6fa75dee8ff7b0603e478d1c765e4a21128709eed639847dadb3fa1670bb2a0 |
| SHA1 hash: | 143fba0621a41a40bd76e9f68216adf1a5cc533e |
| MD5 hash: | 93199205ff2b9437e3f0cb53ec404ba9 |
| humanhash: | quebec-oxygen-vermont-south |
| File name: | Re.invoice.z |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 305'620 bytes |
| First seen: | 2021-01-11 08:13:03 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 6144:ISONUJpRZYZCxZU6ZRapyzMgErekikva+2XEufw:82B/DapKALyEu4 |
| TLSH | 3754232B83A9E54D17727F2BA07C477874A2144F99984B1FD2E992F22B3304F945B9B0 |
| Reporter | |
| Tags: | AgentTesla z |
abuse_ch
Malspam distributing AgentTesla:HELO: hosted-by.rootlayer.net
Sending IP: 185.222.58.152
From: r.abouldahab@emis-int.com
Subject: Re: Quotation
Attachment: Re.invoice.z (contains "Re.invoice.exe")
AgentTesla SMTP exfil server:
srvc13.turhost.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-01-10 19:20:08 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Farheyt
Score:
0.80
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.