MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efa832ff824240107613e256865ca697ae42f57617c66d7b11c8272a94bf9f9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: efa832ff824240107613e256865ca697ae42f57617c66d7b11c8272a94bf9f9c
SHA3-384 hash: 2d850eda5d085dc18b09c80f95167cf0559f39f911aaf6b1b19fb3f6aa2ea8e5db9d766e53e19e1960412859bc6a8acb
SHA1 hash: d8ad9512d39f230552b4c89056e2108d72c68a99
MD5 hash: bebcea0951b8cef9bfad28b537b4d220
humanhash: bravo-edward-oscar-yankee
File name:Inquiry-20201118105427.r00
Download: download sample
Signature AgentTesla
File size:374'304 bytes
First seen:2020-11-18 12:34:50 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 6144:coS3mZoyapVgNJsf30E5b/x4a7crpSY2ZVGzA47fd3TCiJccHYLciej4KFjCMz:co2mZ3a3gNEDV0rpSYUVAh7VPG4eq
TLSH 7A8423EA398AF04DFF00C0DA64117157AFD7AE69DA3DC75A391E7A00C138A6146623FC
Reporter abuse_ch
Tags:AgentTesla r00


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: server.kit-h.com
Sending IP: 185.200.242.204
From: Ali Thakur <info@kuwaitoilers.com>
Subject: PRICE & DELIVERY
Attachment: Inquiry-20201118105427.r00 (contains "Inquiry-20201118105427.exe")

AgentTesla SMTP exfil server:
mail.flood-protection.org:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-11-18 12:35:10 UTC
AV detection:
12 of 48 (25.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r00 efa832ff824240107613e256865ca697ae42f57617c66d7b11c8272a94bf9f9c

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments