MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f5cb5f8e15ddd9f9877ef3fdc5286228fd2fc9776e5de72da022aefe0f603884. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | f5cb5f8e15ddd9f9877ef3fdc5286228fd2fc9776e5de72da022aefe0f603884 |
|---|---|
| SHA3-384 hash: | ec58f3534679d4c2bda68faa7e9d66650e6b1a19eb7a7f43a5b7f0881db19bdb6f04a1a8d144f636830580341622bacd |
| SHA1 hash: | 035d8009882226f6bb208e6df8e530c1ea752310 |
| MD5 hash: | cad45b389103bf5916b8c8ea4ecfc10a |
| humanhash: | april-friend-muppet-alabama |
| File name: | PO345006787999995969790054096969707.zip |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 871'863 bytes |
| First seen: | 2020-10-12 19:31:54 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 24576:FAM68FAURF9RCmAYvOUUqHiagxgYc4v83XpM:rCmBOUTugyv8X6 |
| TLSH | D00523EE84ED87D21747507D1FA03BF1F61D8A7135A808747FB8BA0253049DE9C286DA |
| Reporter | |
| Tags: | AgentTesla zip |
abuse_ch
Malspam distributing AgentTesla:HELO: rkr0.sievo.cf
Sending IP: 46.101.8.130
From: Nantharat Promto <sales08@sievo.cf>
Reply-To: Nantharat Promto <inf0@wantarengineering.com>
Subject: PO#589300030
Attachment: PO345006787999995969790054096969707.zip (contains "PO345006787999995969790054096969707.exe")
AgentTesla SMTP exfil server:
mail.spamora.net:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Taskun
Status:
Malicious
First seen:
2020-10-12 10:28:13 UTC
AV detection:
26 of 48 (54.17%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.65
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.