MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ea5454eb56f86d198066e3bc8d2dcfa19b7bf201aa4671f85ef91deb68592583. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | ea5454eb56f86d198066e3bc8d2dcfa19b7bf201aa4671f85ef91deb68592583 |
|---|---|
| SHA3-384 hash: | 08e55e353b26d34c5c03c46ff6d94b9c64b57ec9df3c752e1501c625d786ea1772275b1be4bf8ecffe90422baa666e36 |
| SHA1 hash: | 051521708afba7025e4d32bf4f3aff7a8f84407c |
| MD5 hash: | 198759d01ba921847353d190ca181e8d |
| humanhash: | tennessee-lemon-lamp-single |
| File name: | QUOTE2021.PDF.GZ |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 474'732 bytes |
| First seen: | 2021-04-08 07:23:33 UTC |
| Last seen: | 2021-04-09 05:29:01 UTC |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:za99GTSH/4gqP4HRpUlnS8cBBMTOrFLcIirwwza:zabwSf4DUUlsBBVLSr/W |
| TLSH | 2EA4239032D144FB90C2B72B95B73DAE2897A981EC2524310E171C05B6DC3BF6FB9B25 |
| Reporter | |
| Tags: | AgentTesla gz |
cocaman
Malicious email (T1566.001)From: "ChuMinTeng <sales@shanghaimetal.com>" (likely spoofed)
Received: "from shanghaimetal.com (unknown [142.93.208.166]) "
Date: "08 Apr 2021 14:58:11 -0700"
Subject: "*URGENT SUPPLY* QUOTE 2021"
Attachment: "QUOTE2021.PDF.GZ"
Intelligence
File Origin
# of uploads :
11
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-08 04:16:52 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
9 of 48 (18.75%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.35
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.