MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e739733762a2a738dccf0a8fe57167baf2a5902d276f4ee2257d7f50cc780d75. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | e739733762a2a738dccf0a8fe57167baf2a5902d276f4ee2257d7f50cc780d75 |
|---|---|
| SHA3-384 hash: | 00944743b3a2aa21e33f13d0a6c406ca5b581a7123e405e58394b954c9faa407c43e6afaaf659656bbe3d949e83438ce |
| SHA1 hash: | 470966605f97b9cb5cff08b5ae3cd9abadc997db |
| MD5 hash: | f9d12f6bc28f37d7f6dad66fc251e7a0 |
| humanhash: | sierra-three-autumn-robin |
| File name: | Interested items with pics, Spec Qty.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 90'337 bytes |
| First seen: | 2020-10-09 05:57:43 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 1536:tNWm5C6I71DiCYCDcLlGgvL6zAJPoeruF5Op2iHybB0aGqaaQoQ9NV1:tNWiC6IEGDUVv2peruF5Op2RcyQ/V1 |
| TLSH | F8930282DB3EA8D904EAC91FC165F4FCA58C2B7B51E5F4D415E874142C2E6C88327AE7 |
| Reporter | |
| Tags: | AgentTesla gz MailChannels |
abuse_ch
Malspam distributing AgentTesla:HELO: burlywood.elm.relay.mailchannels.net
Sending IP: 23.83.212.26
From: info@yunfengfoods.com
Subject: Inquiry for Quotation
Attachment: Interested items with pics, Spec Qty.gz (contains "Interested items with pictures, specification & Quantity~PDF.exe")
AgentTesla SMTP exfil server:
greenlandexportimport.com:587
AgentTesla SMTP exfil email address:
origin@vizvec.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-09 00:26:19 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.