MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f31927f9d5d8f031b01e82d508f4260ed19d4d4cd4cfa4b931a4bb5aebe03e56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | f31927f9d5d8f031b01e82d508f4260ed19d4d4cd4cfa4b931a4bb5aebe03e56 |
|---|---|
| SHA3-384 hash: | c94a634d2eaecff6e290bb1cdf0dc123259e6d84645a1a3c5e8f48c5879fcfac8e956ebe1f8715a3586fa687c7310bf6 |
| SHA1 hash: | fda0db2f31d8c03108e1ed0be2ad8aa931e6b43b |
| MD5 hash: | ba92beb93793a3b474c57532a592a435 |
| humanhash: | wisconsin-crazy-football-blossom |
| File name: | Verdes Toys P.O 170705-7627S.7624S.7263.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 813'063 bytes |
| First seen: | 2020-10-23 11:36:41 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:ZW9dxMqULZi2T/Sh/cxe6FeHPt9eYeqcnddATx40sQY4HQTzeT6vINjeqPfGnZ:1EC+3PHF9eYF6STx40JdwH7eB+Z |
| TLSH | 2705332153A5CDA3D38FA5B1DD431BFDF43948DAC13D0166FABAE128148CA14A81E3B3 |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: verdestoys.com
Sending IP: 185.222.57.240
From: Jackson Lai <jackson@verdestoys.com>
Subject: Verdes October new order
Attachment: Verdes Toys P.O 170705-7627S.7624S.7263.zip (contains "Verdes Toys P.O 170705-7627S.7624S.7263.exe")
AgentTesla SMTP exfil server:
smtp.shakurjay.com:587
AgentTesla SMTP exfil email address:
jayboy@shakurjay.com
Intelligence
File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.Ymacco
Status:
Malicious
First seen:
2020-10-23 09:24:08 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Trojan
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.