MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0611a407032cc160fd80bdadb7ffc3fdd2fd3a09fc31e2fd263624e0e7e6dd74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 0611a407032cc160fd80bdadb7ffc3fdd2fd3a09fc31e2fd263624e0e7e6dd74
SHA3-384 hash: c24366f06cc206b0ee90bac84621c0e5ecf9e498e46e46225fd12ed0002d9e9c19d189a773e27085c53ad39883127b2f
SHA1 hash: 3009aa3d068dabf854d4c6a6de5ce013e114771b
MD5 hash: 29a96632486950aed0800ebca0d71dda
humanhash: edward-bulldog-solar-london
File name:DHL_Express_Shipment_Invoice_Confirmation_CBJ190517000131_74700456XXXX.arj
Download: download sample
Signature AgentTesla
File size:593'469 bytes
First seen:2021-04-08 15:50:30 UTC
Last seen:Never
File type: arj
MIME type:application/x-rar
ssdeep 12288:JDKVni60lzDKJ2FwkXdNUuS6qgovAbFjY5zwB5m9VbMJ:JDKVi6G/KJ25tNyaomYpwB5m9+J
TLSH 4CC423530719E130FFDEE9D811DFDB62AF6B1C9F9AFAC674A7C20E046225250318B069
Reporter abuse_ch
Tags:AgentTesla arj DHL


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: jon.com
Sending IP: 45.156.22.105
From: DHL Express<invoicequerys@dhl.com>
Subject: DHL Notification
Attachment: DHL_Express_Shipment_Invoice_Confirmation_CBJ190517000131_74700456XXXX.arj (contains "DHL_Express_Shipment_Invoice_Confirmation_CBJ190517000131_74700456XXXX.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
223
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.PUA.Wacapew
Status:
Malicious
First seen:
2021-04-08 16:03:37 UTC
AV detection:
9 of 48 (18.75%)
Threat level:
  1/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

arj 0611a407032cc160fd80bdadb7ffc3fdd2fd3a09fc31e2fd263624e0e7e6dd74

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments