MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fdf19cc0213a10256576a4cebd06c2b2e2da9f74eeadec0525589f2202d6c2fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fdf19cc0213a10256576a4cebd06c2b2e2da9f74eeadec0525589f2202d6c2fc
SHA3-384 hash: 9c5a99cfe2430257dcd6249a744af92ca924242b42aed7ee343a6c40157927e6ad55d327c5d2f619b8cce81f78617623
SHA1 hash: 495b0ee5dae6d88c2f9ebb3d442a4c32aee4dac8
MD5 hash: 184a4af7aa6363ed074abb76332fbfd4
humanhash: low-potato-lima-colorado
File name:accounts statement.iso
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-10-10 07:12:09 UTC
Last seen:Never
File type: iso
MIME type:application/x-iso9660-image
ssdeep 12288:oHbAHiPd0e4n6T3rEpyQXMUEldxHR7PUZ:osCVL4n6TQLXM9X
TLSH 4145DEBF110C1B6BC568017A4254900D4EECF8165EB2FE36FEEAB1A863D65CC5EC3961
Reporter abuse_ch
Tags:AgentTesla iso


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: ns10.metro.net.bd
Sending IP: 103.36.103.52
From: Rajat.vinayak <rajat.vinayak@journeysexotica.com>
Subject: Re: Air Freight
Attachment: accounts statement.iso (contains "accounts statement.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.CryptInject
Status:
Malicious
First seen:
2020-10-10 01:54:34 UTC
AV detection:
21 of 48 (43.75%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

iso fdf19cc0213a10256576a4cebd06c2b2e2da9f74eeadec0525589f2202d6c2fc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments