MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c0a283bab14d1914d2208876161373ebc83108265fd9d217f5ede5cbec5a3ae2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c0a283bab14d1914d2208876161373ebc83108265fd9d217f5ede5cbec5a3ae2
SHA3-384 hash: 031a6679c87fb50c90e8e228142019e9c46ad36f06ce69faa13affdf51d3564992ee781d6b235368386a50db97c7eb8d
SHA1 hash: 7e0562240c5cb54bc8a27a434c6065cc128679c2
MD5 hash: 47b456d4b506658766346149633909d3
humanhash: oxygen-monkey-mountain-hamper
File name:COVID-19 Communication to corporate Clients..rar
Download: download sample
Signature AgentTesla
File size:1'392'791 bytes
First seen:2020-03-30 11:18:44 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:TTdC7DLweDLynmch0y3l0nLNmlABVy9vSYNPJMq0QlHIJC+:T5aynmcr2RmlAByvXNPJMqtFIJZ
TLSH 9A553396C11513F6DE05104BAF3DEB02A1D2EE85A4BEF5078292C0EDCF64F236D6895B
Reporter abuse_ch
Tags:AgentTesla COVID-19 rar


Avatar
abuse_ch
COVID-19 themed malspam distributing AgentTesla:

HELO: smtp.smlab.ma
Sending IP: 163.172.133.4
From: hdridelli@gpa-export.com
Subject: Important Notice to Our Corporate Clients & Partners - COVID -19
Attachment: COVID-19 Communication to corporate Clients..rar (contains "COVID-19 Communication to corporate Clients..exe")

AgentTesla SMTP exfil server:
mail.rajalakshmi.co.in:587 (43.225.55.205)

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Script-AutoIt.Trojan.Injector
Status:
Malicious
First seen:
2020-03-31 03:52:20 UTC
File Type:
Binary (Archive)
Extracted files:
27
AV detection:
19 of 46 (41.30%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar c0a283bab14d1914d2208876161373ebc83108265fd9d217f5ede5cbec5a3ae2

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments