MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a163b497b34fa65684b1f5f89a339f0dcfc24699b597d61db7f7dc46a11aad9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 0a163b497b34fa65684b1f5f89a339f0dcfc24699b597d61db7f7dc46a11aad9
SHA3-384 hash: 10814737ebb2874a89c813bfab656607dc0c6da133cbc608d3f7ca2d09d63a4695f30933978aacee097c38e55528d06c
SHA1 hash: 7bf3dafb165646da2f02885885c413071f67509b
MD5 hash: c3d06cbf8c237b569c0f1b33686e2a30
humanhash: sad-magnesium-princess-beryllium
File name:PURCHASE LIST.pdf.arj
Download: download sample
Signature AgentTesla
File size:498'206 bytes
First seen:2021-04-02 06:26:54 UTC
Last seen:2021-04-02 06:40:46 UTC
File type: arj
MIME type:application/x-rar
ssdeep 12288:Ny2oZYnk/uDHzlqCtr9rU2gf4HaTOujv4xBAG2RgYxfw2f4A1:SYk/uDHn9rpgTjeLMxfw2wA1
TLSH 6CB423FA9D1FD3C354D77B8750602EB1EB38A3955129BA614F81476B089322B8F72BC4
Reporter cocaman
Tags:AgentTesla arj


Avatar
cocaman
Malicious email (T1566.001)
From: "Chusui Wang <sales@orico.com.cn>" (likely spoofed)
Received: "from orico.com.cn (unknown [142.93.208.166]) "
Date: "01 Apr 2021 18:33:56 -0700"
Subject: "NEW PO FROM ORICO Technologies Co. QTTY (PO#7A68D21)"
Attachment: "PURCHASE LIST.pdf.arj"

Intelligence


File Origin
# of uploads :
10
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-01 21:07:54 UTC
AV detection:
11 of 44 (25.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

arj 0a163b497b34fa65684b1f5f89a339f0dcfc24699b597d61db7f7dc46a11aad9

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments