MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bea5fae45c6c06e4c4b4dc55d41b710737ddf8031d4d1a16f7e6341b6e8b144a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | bea5fae45c6c06e4c4b4dc55d41b710737ddf8031d4d1a16f7e6341b6e8b144a |
|---|---|
| SHA3-384 hash: | 723f4150632de431d1065559c3204d56cfd4c43d461ef835c2d5a402d84b987fef8b288f2d5ba9f7739f87cc97995c50 |
| SHA1 hash: | 468c29f91b1fca90cf5fa61125568596a7be57f9 |
| MD5 hash: | b7dfaa686f7ea2eecaf54e4c23c0efbb |
| humanhash: | sweet-equal-fourteen-maryland |
| File name: | wire transfer usd 44.151.83.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 408'247 bytes |
| First seen: | 2020-08-05 08:47:56 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:D1X1iY4tPvsLiOHyKZt2W5WA8SpTtNPPsr6e8W9RMDnhkNSq2ApX6OGi+2AY:Jlb4Pvqso4KWAdpTr7aoOpX6OGi+2AY |
| TLSH | D99423A8ECECED4D2762F334A0802CDA21969C94DE676346F25CB5B1A0F0F4685FB715 |
| Reporter | |
| Tags: | AgentTesla rar |
abuse_ch
Malspam distributing AgentTesla:HELO: unique-logistics.com
Sending IP: 103.133.104.130
From: Cecilia.Cheng <cecilia.cheng.hgh@unique-logistics.com>
Reply-To: cecilia.cheng.hgh@unique-logistics.com
Subject: wire transfer USD 44.151.83
Attachment: wire transfer usd 44.151.83.rar (contains "wire transfer usd 44.151.83.exe")
AgentTesla SMTP exfil server:
mail.pkfpmes.co.ke:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Skeeyah
Status:
Malicious
First seen:
2020-08-05 08:04:54 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.