MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d93c195d1ddc5e2d46a76c6dd8c3bfeb00ae45fa78a9561630b86f11f8fb01ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: d93c195d1ddc5e2d46a76c6dd8c3bfeb00ae45fa78a9561630b86f11f8fb01ca
SHA3-384 hash: 549d7008e914d3e3ae0ebbd4a46f8e7d51cdf0b2217c32ab3abe7becfc31349dddc00d835b55d642326a59ce936b51c5
SHA1 hash: a3f97991bb3447759349ce96d30fa83e90fa8fb0
MD5 hash: 9f657d9a46f6d1c1d4858e034c6ee7e6
humanhash: beer-pip-magnesium-emma
File name:BANK LETTER.IMG
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-08-04 13:32:12 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 12288:Kan0Z2Yi+7d53Do5gFBfUZ3/k59qKUF4:uZ2YJTgAsZ3qkd
TLSH B445236737B0A195E61102B006FCE2A68AD65D9713D0EB0BB7CC7FC97771282470E99E
Reporter abuse_ch
Tags:AgentTesla Hostwinds img


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: hwsrv-752042.hostwindsdns.com
Sending IP: 104.168.159.72
From: info@emeanark.com
Subject: Confirm bank letter
Attachment: BANK LETTER.IMG (contains "BANK LETTER.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Backdoor.Remcos
Status:
Suspicious
First seen:
2020-08-04 13:34:06 UTC
AV detection:
12 of 48 (25.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

img d93c195d1ddc5e2d46a76c6dd8c3bfeb00ae45fa78a9561630b86f11f8fb01ca

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments