MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 28f1e6628137e202c88ab3a87bf2a238345248bc4a49b0da30da7b952423a4ae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 28f1e6628137e202c88ab3a87bf2a238345248bc4a49b0da30da7b952423a4ae
SHA3-384 hash: eeadffd75b0bc83cf45f248eb2888051ed2cebc5fa02e2ebd35d459eef3828edb967b036816855ff7bbc7ce46fa9bb21
SHA1 hash: a6f97e5c01f8f0206c6f8b8ed55433f75bff2992
MD5 hash: fd92e2d96c5ec04252f26f2e02df44a0
humanhash: asparagus-florida-xray-arkansas
File name:PO_6620200947535257661_Arabico.PDF.zip
Download: download sample
Signature AgentTesla
File size:743'395 bytes
First seen:2021-04-05 06:30:06 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:c2TBXHgehrc2746lwaybE3/tW7odKBYhEJ8/qT4m2xElgo/thLUfwmMTgB+8dgZT:htHfhrc28XaWEPt7v2822uq/Ykcf
TLSH 7CF4330C17F4F5742DB2DE81CBC2C67E6CC98B3716E9193EE211B22484A22A395F647D
Reporter abuse_ch
Tags:zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: [89.41.26.168]
Sending IP: 89.41.26.168
From: Purchase <purchase@arabico.ae>
Subject: URGENT QUOTATION - arabico company dubai
Attachment: PO_6620200947535257661_Arabico.PDF.zip (contains "PO_6620200947535257661_Arabico.PDF.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-05 06:30:10 UTC
AV detection:
16 of 48 (33.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 28f1e6628137e202c88ab3a87bf2a238345248bc4a49b0da30da7b952423a4ae

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments