MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fbb8b61a2dadadfc1a302d3e47250ffdd9a57b0c8c8ca27b14738ca7951f2fa5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 3
| SHA256 hash: | fbb8b61a2dadadfc1a302d3e47250ffdd9a57b0c8c8ca27b14738ca7951f2fa5 |
|---|---|
| SHA3-384 hash: | 3e2af247f8044091114d16be04b969a0fd81dbf63b92d5c2d0f2b1575d8fdeb27edafbba0a1ff2958deaebfc2ca6c1e2 |
| SHA1 hash: | 522072694cc76c1485bf66c85af3bfb72fbb78f6 |
| MD5 hash: | cbc9d54ac0a7bada8af9f71f0ed98901 |
| humanhash: | emma-oven-spring-four |
| File name: | PO for 410303-1.img |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 839'680 bytes |
| First seen: | 2021-02-16 06:48:42 UTC |
| Last seen: | Never |
| File type: | img |
| MIME type: | application/x-iso9660-image |
| ssdeep | 12288:bZdvG9gsBqk1k4z2pMD7ndyXVfdyZbWeHkxQUaUSJ8PA1um2Tetqx:/G9gsBKG20JQfdyFWQSOJoAZ2iA |
| TLSH | 4A05AE1067905F66F17E9736A9E8560047F9BC97E760EA2F3EF830CA0574F40C66262B |
| Reporter | |
| Tags: | AgentTesla img |
abuse_ch
Malspam distributing AgentTesla:HELO: 107-174-142-107-host.colocrossing.com
Sending IP: 107.174.142.107
From: agus.sriyono@conocophillips.com
Subject: RE: MRP Messages and Purchasing-12-30
Attachment: PO for 410303-1.img (contains "PO for 410303-1.exe")
AgentTesla payload URL:
http://185.215.150.204/file/btc.exe
AgentTesla SMTP exfil server:
mail.hermanusbearings.co.za:587
Intelligence
File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-16 06:49:16 UTC
AV detection:
7 of 47 (14.89%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.