MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 db8f9afbd27731f8899013e88ce0f155241c8807ddefe7a5391a8205869873bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | db8f9afbd27731f8899013e88ce0f155241c8807ddefe7a5391a8205869873bd |
|---|---|
| SHA3-384 hash: | f5881512e44da97d963fe488a1c5e411debe080da3580c61ad72ccb30e8957cd8674079957b3a89067af3bd5848a99b8 |
| SHA1 hash: | d489ce3aeff35e1f4ccc68f2ffb2eb98a0eb73e5 |
| MD5 hash: | 10dfd1676daf7ba6493182aee607ccaf |
| humanhash: | happy-colorado-sink-lactose |
| File name: | New Purchase Order.tar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 931'840 bytes |
| First seen: | 2021-03-16 11:09:47 UTC |
| Last seen: | Never |
| File type: | tar |
| MIME type: | application/x-tar |
| ssdeep | 24576:MYwzmGYmA2oBZP1w5ZvogHjZen56xHIZAR:PoE1wvzPI |
| TLSH | CD1512253B8DA676E03E97341464260003F4BD66EB13D74E7EA630DE6D76B80863B727 |
| Reporter | |
| Tags: | AgentTesla tar |
abuse_ch
Malspam distributing unidentified malware:HELO: scgtai.com
Sending IP: 104.223.33.162
From: Danny Lin <aple@scgtai.com>
Subject: Re: New Purchase Order for March P2209G
Attachment: New Purchase Order.tar (contains "New Purchase Order.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-16 11:10:06 UTC
File Type:
Binary (Archive)
Extracted files:
23
AV detection:
19 of 47 (40.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.40
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.