MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d86f4505bfa5f18fb33bac7b3d1e4708789cb694e8db589d928b105cab03dfa0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: d86f4505bfa5f18fb33bac7b3d1e4708789cb694e8db589d928b105cab03dfa0
SHA3-384 hash: fd5daece5ee3fcc1ca6d0fb0bcba55c4a220af349a101101874089771066065f5a17bd779a478a00f1c7a0983c14b6b0
SHA1 hash: 59a66360d2e897edf4377d405172880466f03930
MD5 hash: 3e963851331e109ba49d0f5ccfc3d998
humanhash: moon-diet-december-mango
File name:RFQ_CR202102020 - MR2021013057_pdf.gz
Download: download sample
Signature AgentTesla
File size:505'355 bytes
First seen:2021-02-08 09:00:08 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:l+Y7szcr2b/xLKbBc3gZGcYV1QsnHN4/l4tJ+DuVOYfGb9:l/772b/VkxZGRQFda8MOYfy
TLSH A8B423F137DC596641C6722D7338A4CF8D889AD3C84636F198B2CB7967E92227D94F02
Reporter cocaman
Tags:gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Dariusz Lukaszewicz <N.gathundia@maltaurome.com>" (likely spoofed)
Received: "from postfix-inbound-6.inbound.mailchannels.net (inbound-egress-6.mailchannels.net [199.10.31.238]) "
Date: "Mon, 08 Feb 2021 08:55:50 +0100"
Subject: "RFQ - PR no. CR202102020 - MR20210130 (TOP_URGENT)"
Attachment: "RFQ_CR202102020 - MR2021013057_pdf.gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Ransomware.TeslaCrypt
Status:
Malicious
First seen:
2021-02-08 09:01:05 UTC
File Type:
Binary (Archive)
Extracted files:
28
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz d86f4505bfa5f18fb33bac7b3d1e4708789cb694e8db589d928b105cab03dfa0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments