MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0a163b497b34fa65684b1f5f89a339f0dcfc24699b597d61db7f7dc46a11aad9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 0a163b497b34fa65684b1f5f89a339f0dcfc24699b597d61db7f7dc46a11aad9 |
|---|---|
| SHA3-384 hash: | 10814737ebb2874a89c813bfab656607dc0c6da133cbc608d3f7ca2d09d63a4695f30933978aacee097c38e55528d06c |
| SHA1 hash: | 7bf3dafb165646da2f02885885c413071f67509b |
| MD5 hash: | c3d06cbf8c237b569c0f1b33686e2a30 |
| humanhash: | sad-magnesium-princess-beryllium |
| File name: | PURCHASE LIST.pdf.arj |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 498'206 bytes |
| First seen: | 2021-04-02 06:26:54 UTC |
| Last seen: | 2021-04-02 06:40:46 UTC |
| File type: | arj |
| MIME type: | application/x-rar |
| ssdeep | 12288:Ny2oZYnk/uDHzlqCtr9rU2gf4HaTOujv4xBAG2RgYxfw2f4A1:SYk/uDHn9rpgTjeLMxfw2wA1 |
| TLSH | 6CB423FA9D1FD3C354D77B8750602EB1EB38A3955129BA614F81476B089322B8F72BC4 |
| Reporter | |
| Tags: | AgentTesla arj |
cocaman
Malicious email (T1566.001)From: "Chusui Wang <sales@orico.com.cn>" (likely spoofed)
Received: "from orico.com.cn (unknown [142.93.208.166]) "
Date: "01 Apr 2021 18:33:56 -0700"
Subject: "NEW PO FROM ORICO Technologies Co. QTTY (PO#7A68D21)"
Attachment: "PURCHASE LIST.pdf.arj"
Intelligence
File Origin
# of uploads :
10
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-01 21:07:54 UTC
AV detection:
11 of 44 (25.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.81
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.