MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ff6b7c52f3b700f8c61f16fc11a192630ecfa7f39273b809682573b1ada2e497. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 4
| SHA256 hash: | ff6b7c52f3b700f8c61f16fc11a192630ecfa7f39273b809682573b1ada2e497 |
|---|---|
| SHA3-384 hash: | a3ba2cf257a97a1afcf2a9d0808b17506fe153e175b0a7657a28472a5649fc1aa66f25cb175ad0718610aecbbe9e162a |
| SHA1 hash: | ed7e1b86d08493a220df9fec7e80ce0545176e4b |
| MD5 hash: | 6524d8df60c80013800d0046f9289c63 |
| humanhash: | apart-king-sierra-whiskey |
| File name: | Consignment Details PLBL Draft.r00 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 261'697 bytes |
| First seen: | 2020-10-06 05:38:31 UTC |
| Last seen: | 2020-10-06 05:38:46 UTC |
| File type: | r00 |
| MIME type: | application/x-rar |
| ssdeep | 6144:MwUlG5OuOrz/BLZK6R6EEHVwl4ereQ5MHeomkF4I4jcE4whg9eOAlMcow:4+VY9IcAV04erefeomkhIxPhg9eV6cP |
| TLSH | 944423AE9A0705F8F86815545664EC3B2A49A4A32F43FDF53B476F2D7FB340A029ED01 |
| Reporter | |
| Tags: | AgentTesla r00 |
abuse_ch
Malspam distributing AgentTesla:HELO: awef0.318.cicmo.ml
Sending IP: 159.89.233.101
From: TNT EXPRESS <service@tnt.com>
Subject: Consignment Notification: You Have A Package With Us
Attachment: Consignment Details PLBL Draft.r00 (contains "Consignment Details PL&BL Draft.exe")
AgentTesla SMTP exfil server:
mail.flood-protection.org:587
Intelligence
File Origin
# of uploads :
3
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-06 01:53:12 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.