MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff732cdb1cae4ffb2d9f171de3d2b01b37811bed29107009810e3fa3af89afa7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: ff732cdb1cae4ffb2d9f171de3d2b01b37811bed29107009810e3fa3af89afa7
SHA3-384 hash: 0a7215a591811b65a3ef9e20fd467df4328ba75094341772913f6ad17fe903ae07a5e08fc5adcf25e90aea9e5e9ec69c
SHA1 hash: b2f9069cdd78fa902cd5fe3a9f6304e6da007c15
MD5 hash: 900d34ebd4a21e612b68b73e1b24ff02
humanhash: louisiana-carpet-ack-eleven
File name:TOYO Engineering EPCC for BIO-MEG Project AYBF001 Hot Oil Heater 224062020_scanned from a xerox devi
Download: download sample
Signature AgentTesla
File size:1'245'184 bytes
First seen:2020-06-24 07:38:08 UTC
Last seen:Never
File type: iso
MIME type:application/x-iso9660-image
ssdeep 12288:yyoAFMXI/SsTqwEEoWhTOwvuivmg6+33/Gn:yybjIEMiegTE
TLSH 5445F0C733989A13DA7909F588905A409BF9BD5BA1D2F18C3C8D72A62BF37F150216C7
Reporter abuse_ch
Tags:AgentTesla


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: server.radmadengines.com
Sending IP: 162.241.204.155
From: Toyo Engineering & Construction Sdn. Bhd <nmw_ikram@toyo-eng.com>
Subject: [PR259 BIO-MEG] AYBF001 Hot Oil Heater / RFQ / Toyo Engineering & Construction Sdn. Bhd
Attachment: TOYO Engineering EPCC for BIO-MEG Project AYBF001 Hot Oil Heater 224062020_scanned from a xerox devi (contains "TOYO_ENG.EXE")

AgentTesla SMTP exfil server:
smtp.masterindo.net:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-24 07:40:08 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

iso ff732cdb1cae4ffb2d9f171de3d2b01b37811bed29107009810e3fa3af89afa7

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments