MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d58b7d9a7421241504ffd810068b118caedb82f45216d7ec4e1a0c9f32c03a72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | d58b7d9a7421241504ffd810068b118caedb82f45216d7ec4e1a0c9f32c03a72 |
|---|---|
| SHA3-384 hash: | ed7d225bd6d3caf49b7e36c1d1941249386c08b207a2d2c42e16a8ba79d4a4aec2ecf3a992b0f169b43da39f2f4a9511 |
| SHA1 hash: | f32d7c412bf98239015b34e01e557d4ca12708f1 |
| MD5 hash: | 84626173b860d638e5bd1449aff56652 |
| humanhash: | texas-cat-london-louisiana |
| File name: | PACKING LIST PL-1070957 BILL OF LADING BLI-170685.PDF.IMG |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 1'245'184 bytes |
| First seen: | 2020-10-25 17:17:40 UTC |
| Last seen: | Never |
| File type: | img |
| MIME type: | application/x-iso9660-image |
| ssdeep | 12288:+ExSV9I9mT7b0gIoeGCQbk+I8qsC7HF3jb76x8R8nVpyRZLANnS01LxEO3:pbmT7PDJlgHpv6ORFO |
| TLSH | 3A45BE9C3690B2DFC457C937CAA81C64AA60B5BB530BD207B42712AD9E0D99BCF151F3 |
| Reporter | |
| Tags: | AgentTesla img |
abuse_ch
Malspam distributing AgentTesla:HELO: transfopam.com
Sending IP: 83.149.106.1
From: Logistic Manager <enquire@transfopam.com>
Subject: PACKING LIST -1070957 & BILL OF LADING #BLI-170685 / Departure 27th OCT 2020
Attachment: PACKING LIST PL-1070957 BILL OF LADING BLI-170685.PDF.IMG (contains "6PYF2g2UbXNR62d.exe")
AgentTesla SMTP exfil server:
mail.thanhphet.asia:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
56
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-25 14:22:53 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.45
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.