MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f121060109f24507a6b87efd38961c89eb843aea2ad4b7e41573b80639881f27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | f121060109f24507a6b87efd38961c89eb843aea2ad4b7e41573b80639881f27 |
|---|---|
| SHA3-384 hash: | 1acabf5ec1bffb73c022ac4f55959f0bbb6f7f06afcef05d102c0b769f5e4d66f6ae3f4e8f9b148be78cb9d6cd3779a7 |
| SHA1 hash: | abf906030160aebfafdeac022f857c63a4a17352 |
| MD5 hash: | 2b94c7ec8227900841bb1b377fb25870 |
| humanhash: | jupiter-oranges-batman-fruit |
| File name: | IMG-9R984-PO-DETAILS.rar |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 371'690 bytes |
| First seen: | 2020-10-23 14:50:49 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:gvOVvQPrm8Tis5DbRygdkRb7um9iM8R+echMsAoSTb00n94QDcfuKpwwhlYjiyY2:gAKmrs5Db2+m9iM88eqM5FTb00n9WuKC |
| TLSH | A284234A8CFD1B46419601BD97A2A4BAB83F903B8E4EC41E6780027CBD5C3D7D9D7C1A |
| Reporter | |
| Tags: | AgentTesla Maersk rar |
abuse_ch
Malspam distributing AgentTesla:HELO: mail.happyisp.com
Sending IP: 5.206.224.208
From: MAERSK LINE <bulgaria@alphajetservices.com>
Subject: URGENT TELEX RELEASE - RE Shipment Bill of lading 20170000112
Attachment: IMG-9R984-PO-DETAILS.rar (contains "IMG-9R984-PO-DETAILS.exe")
AgentTesla SMTP exfil server:
mail.karotowaenterprise.com:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
Win32.Malware.Generic
Status:
Suspicious
First seen:
2020-10-23 14:14:02 UTC
AV detection:
2 of 48 (4.17%)
Threat level:
2/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.