MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d245b8f7b96be20c39a84e11d19a770b6dc3155ccbe668843bd4682f262bc174. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: d245b8f7b96be20c39a84e11d19a770b6dc3155ccbe668843bd4682f262bc174
SHA3-384 hash: 4445058a1d6c4c9b0375dea7f1f7d5e6541fb35a56e449be1f90fd9534b277f52263fa49d87fe2c06b292d072cf62e49
SHA1 hash: 8f113d26aa23fbc55f4027f7261b359df3f129c3
MD5 hash: 8b1f0a00024f52d85c298a0f323836cc
humanhash: two-wolfram-chicken-bacon
File name:Payment Copy.gz
Download: download sample
Signature AgentTesla
File size:373'057 bytes
First seen:2020-08-19 11:29:17 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:b+MGJUkS7IZiE3jmJI3eTOD97H+MwaXCQtkwXPloMkLWGUbBCrgBdNpmj5Av5M:b+MGJduIkE3j5MCztXCC1XPloWGUbUk6
TLSH 4D84234F010350EDF79D0AF56643E605FA747A290E8E8CA8D7AFA394CFD5816871836B
Reporter abuse_ch
Tags:AgentTesla gz


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: server.domain.com
Sending IP: 89.45.4.248
From: accountdept <accountoffice1@worldtransfer.com>
Subject: Re: TT Payment
Attachment: Payment Copy.gz (contains "Payment Copy.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-08-19 11:31:05 UTC
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip d245b8f7b96be20c39a84e11d19a770b6dc3155ccbe668843bd4682f262bc174

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments