MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06c41ac3b1c9c2913aacf32ba3c4f21b0182b36db66b6e4d07e0ed610f98cfb6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 06c41ac3b1c9c2913aacf32ba3c4f21b0182b36db66b6e4d07e0ed610f98cfb6
SHA3-384 hash: 494979653e3af9824e215d627575f56fc05364d9de3a1165d72e4c057a5d5a4f0219710d151628370ffdcf416d563ebe
SHA1 hash: 27c63eabf989f5996e7b9f5c8d560c95ce9db7a7
MD5 hash: 715c87ffb0854681c7cc37d4f5914871
humanhash: december-saturn-oklahoma-maryland
File name:Products Order.r00
Download: download sample
Signature AgentTesla
File size:922'742 bytes
First seen:2021-08-02 16:07:49 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 24576:Z3G955hqKA48lpC17W7ry5zCf4NttomzxVL9Wycjq:khy3lfHwzC03FzxVhrcjq
TLSH T1A51533DCEC518E95D90E9B77F147D237C650DEE9CFC690138AA76120A4588AFCC4BB22
Reporter cocaman
Tags:AgentTesla r00


Avatar
cocaman
Malicious email (T1566.001)
From: "MARTINEZ, CARMEN<carmen.martinez@chemours.com>" (likely spoofed)
Received: "from chemours.com (unknown [185.222.57.75]) "
Date: "02 Aug 2021 15:45:14 +0200"
Subject: "=?UTF-8?B?IFJlOiBSZTogUkVNSU5ERVIg77u/T3JkZXIgQ29uZmlybWF0aW9uIDg1MDUwMDg3NzggVXRkLkFyYWIuRW1pci4=?="
Attachment: "Products Order.r00"

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-02 15:13:22 UTC
File Type:
Binary (Archive)
Extracted files:
138
AV detection:
12 of 46 (26.09%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r00 06c41ac3b1c9c2913aacf32ba3c4f21b0182b36db66b6e4d07e0ed610f98cfb6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments