MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c118d3518d60f166689ddaed518d85ba325a9e971383125e84971e9bbccef79f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c118d3518d60f166689ddaed518d85ba325a9e971383125e84971e9bbccef79f
SHA3-384 hash: 08761481b1c03f6d1fe6e15db8f9f2d4d677d0a77d454963b7fe15fa09f0d4068a64372923c701b3fa00785ff98edb65
SHA1 hash: 386973991b32bbe9d8269e8800f289ebda17dda5
MD5 hash: ddcf0fdcbdeaf4ed6e35c318c7700cc9
humanhash: carolina-carolina-rugby-mirror
File name:Displacer Level Transmitters - PDO Bidding.gz
Download: download sample
Signature AgentTesla
File size:361'981 bytes
First seen:2020-07-24 05:49:20 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 6144:ZSIys58ZZmMbfq60aRZOhVp81EfRZw4bRks6b5vcE4etcZG2ljNxxo0:ZSHs58TmMr/0aO/p3RZw4NP61vcE4k0h
TLSH B874239A73A3CF2EB49951B97DDBC8546E8C3DBD06C0A35076152EEA5DD0C4237BA088
Reporter cocaman
Tags:AgentTesla gz


Avatar
cocaman
Malicious email
From: MIDDLE EAST OILFIELD SERVICES LLC <admin@sakurarubber.com>
Received: from sakurarubber.com (unknown [37.48.85.197])
Date: 24 Jul 2020 05:42:00 -0700
Subject: OMI/EN-FAB, Inc. RFQ Q-80079 (Q-20-28) - Level (DP) Transmitters/Displacer Level Transmitters - PDO Bidding
Attachment: Displacer Level Transmitters - PDO Bidding.gz

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-24 05:51:05 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz c118d3518d60f166689ddaed518d85ba325a9e971383125e84971e9bbccef79f

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments