MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea5454eb56f86d198066e3bc8d2dcfa19b7bf201aa4671f85ef91deb68592583. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: ea5454eb56f86d198066e3bc8d2dcfa19b7bf201aa4671f85ef91deb68592583
SHA3-384 hash: 08e55e353b26d34c5c03c46ff6d94b9c64b57ec9df3c752e1501c625d786ea1772275b1be4bf8ecffe90422baa666e36
SHA1 hash: 051521708afba7025e4d32bf4f3aff7a8f84407c
MD5 hash: 198759d01ba921847353d190ca181e8d
humanhash: tennessee-lemon-lamp-single
File name:QUOTE2021.PDF.GZ
Download: download sample
Signature AgentTesla
File size:474'732 bytes
First seen:2021-04-08 07:23:33 UTC
Last seen:2021-04-09 05:29:01 UTC
File type: gz
MIME type:application/x-rar
ssdeep 12288:za99GTSH/4gqP4HRpUlnS8cBBMTOrFLcIirwwza:zabwSf4DUUlsBBVLSr/W
TLSH 2EA4239032D144FB90C2B72B95B73DAE2897A981EC2524310E171C05B6DC3BF6FB9B25
Reporter cocaman
Tags:AgentTesla gz


Avatar
cocaman
Malicious email (T1566.001)
From: "ChuMinTeng <sales@shanghaimetal.com>" (likely spoofed)
Received: "from shanghaimetal.com (unknown [142.93.208.166]) "
Date: "08 Apr 2021 14:58:11 -0700"
Subject: "*URGENT SUPPLY* QUOTE 2021"
Attachment: "QUOTE2021.PDF.GZ"

Intelligence


File Origin
# of uploads :
11
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-08 04:16:52 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
9 of 48 (18.75%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz ea5454eb56f86d198066e3bc8d2dcfa19b7bf201aa4671f85ef91deb68592583

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments