MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bef1ebb754bcf4bf6d2d28646b6d14c026aab0fb0c0867bfe5b3569a2c0f54e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: bef1ebb754bcf4bf6d2d28646b6d14c026aab0fb0c0867bfe5b3569a2c0f54e2
SHA3-384 hash: c2b76547e828921e3525d6d1616632d5b339e9057751bc41d93f7a1a3e39ef66319fe9f749732683c71e66846663a09c
SHA1 hash: 2ffd56a321746dfaa675a4072db9a6c2b5988c0e
MD5 hash: 2c4a886ff3e23b9918bcbe9e018f2463
humanhash: pizza-thirteen-bulldog-avocado
File name:Tender.gz
Download: download sample
Signature AgentTesla
File size:461'040 bytes
First seen:2020-10-05 11:47:21 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 6144:P3SPBvI9Ax75DkaFbdf+NTBQBWfR8TdF88k2WQ0qhZ4H6VIi+vq0U/xLhMEuEK4w:/SdIqFCw+RBZR8p1rW1qhQ6VXo8xm50w
TLSH 8AA42358A357CCD85718BC5CCEA4A8C52136B3EE0CE18A1FF9AD94AD41C1E3AC5578CE
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing AgentTesla:

From: kate.chong <kate.chong@connols-air.com>
Subject: K/A. Purchase Manager - Supplies of engineering products and spares/URGENT
Attachment: Tender.gz (contains "Tender.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Bulz
Status:
Malicious
First seen:
2020-10-05 08:26:06 UTC
AV detection:
6 of 48 (12.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz bef1ebb754bcf4bf6d2d28646b6d14c026aab0fb0c0867bfe5b3569a2c0f54e2

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments