MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db8f9afbd27731f8899013e88ce0f155241c8807ddefe7a5391a8205869873bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: db8f9afbd27731f8899013e88ce0f155241c8807ddefe7a5391a8205869873bd
SHA3-384 hash: f5881512e44da97d963fe488a1c5e411debe080da3580c61ad72ccb30e8957cd8674079957b3a89067af3bd5848a99b8
SHA1 hash: d489ce3aeff35e1f4ccc68f2ffb2eb98a0eb73e5
MD5 hash: 10dfd1676daf7ba6493182aee607ccaf
humanhash: happy-colorado-sink-lactose
File name:New Purchase Order.tar
Download: download sample
Signature AgentTesla
File size:931'840 bytes
First seen:2021-03-16 11:09:47 UTC
Last seen:Never
File type: tar
MIME type:application/x-tar
ssdeep 24576:MYwzmGYmA2oBZP1w5ZvogHjZen56xHIZAR:PoE1wvzPI
TLSH CD1512253B8DA676E03E97341464260003F4BD66EB13D74E7EA630DE6D76B80863B727
Reporter abuse_ch
Tags:AgentTesla tar


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: scgtai.com
Sending IP: 104.223.33.162
From: Danny Lin <aple@scgtai.com>
Subject: Re: New Purchase Order for March P2209G
Attachment: New Purchase Order.tar (contains "New Purchase Order.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-16 11:10:06 UTC
File Type:
Binary (Archive)
Extracted files:
23
AV detection:
19 of 47 (40.43%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

tar db8f9afbd27731f8899013e88ce0f155241c8807ddefe7a5391a8205869873bd

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments