MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f2e0c0356d6e6c7490404a950d75cafeffe016cf5dfb876d9fcebf7d4c0c6b3c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | f2e0c0356d6e6c7490404a950d75cafeffe016cf5dfb876d9fcebf7d4c0c6b3c |
|---|---|
| SHA3-384 hash: | 731a9c8b73b383460fc493eb2c9d2b555d9b8a027460129e9795b72986505a660352c14d08e60b53c26e73df198f0938 |
| SHA1 hash: | c2c59944bf4caaf58ff31c3e0b102755e93befa7 |
| MD5 hash: | 8547c68b4869c73ea482b7f44a1681a1 |
| humanhash: | yankee-fifteen-mike-mars |
| File name: | Invoices documents sign and stamp.cab |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 688'082 bytes |
| First seen: | 2020-08-17 06:24:05 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:K42dWMdyUWrNJDmmLWkrwtWm3QY4IFcAkTiTq49z6ZdvYb2NAwyPFV6nbTE:KM9RrNNmmLW82ITiP9zCm3P |
| TLSH | 14E433DE7657D2518881B121BDAF3DCC1D20BB11BCFAA52D8295DF69BC086D4E40AF38 |
| Reporter | |
| Tags: | AgentTesla cab |
abuse_ch
Malspam distributing AgentTesla:HELO: wurthsnider.com
Sending IP: 95.211.208.25
From: Cristina William <lSkidmore@wurthsnider.com>
Subject: Best global payment advice // PI # CFL002 / 19A
Attachment: Invoices documents sign and stamp.cab (contains "Invoices documents sign and stamp.exe")
AgentTesla SMTP exfil server:
smtp.koeni.cc:587
AgentTesla SMTP exfil email address:
foward2@koeni.cc
Intelligence
File Origin
# of uploads :
1
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-08-17 06:25:08 UTC
AV detection:
26 of 48 (54.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.