MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 87c9184ce7157f9ba2618caf80278bb28f55d7a844006db1fae4f87d6e442ac2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 87c9184ce7157f9ba2618caf80278bb28f55d7a844006db1fae4f87d6e442ac2
SHA3-384 hash: 6ad8c56380949b5acae6728dbda5f208f7fa265badff435a6e7c2c64c52131eb05a0eb76f7935d473b53d057429efad2
SHA1 hash: 0c43d2b05288c261bd2e0731cd9dc99b49b28572
MD5 hash: 26e4412f36416fa2934a544ca499df5f
humanhash: aspen-low-eleven-happy
File name:Purchase Order.r00
Download: download sample
Signature AgentTesla
File size:802'106 bytes
First seen:2020-08-19 14:53:42 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 24576:ljpEiNK48xwrYnEkaJLKvMXIKDL/xbSlXmihH7:lOuKD8YnE76MXIQymihb
TLSH 8D053338BD18C32921FD9FF9EB8B7962DF4D8A2164D0D34D89171386CDD6541EA388E2
Reporter abuse_ch
Tags:AgentTesla r00


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: webmail.cyber.net.pk
Sending IP: 203.101.175.37
From: Vikas Ramdham <gsea@cyber.net.pk>
Subject: RE: PURCHASE ORDER
Attachment: Purchase Order.r00 (contains "Purchase Order.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Ymacco
Status:
Malicious
First seen:
2020-08-19 14:55:08 UTC
AV detection:
17 of 47 (36.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r00 87c9184ce7157f9ba2618caf80278bb28f55d7a844006db1fae4f87d6e442ac2

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments