MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3db7b2974cb01c3cc9c32645c7ba55a6bfb202f20cf7518fce62559cf5652586. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ISRStealer
Vendor detections: 3
| SHA256 hash: | 3db7b2974cb01c3cc9c32645c7ba55a6bfb202f20cf7518fce62559cf5652586 |
|---|---|
| SHA3-384 hash: | a44be22f1d3bffde3f1b0d687fd2b05e487db31aec4aefa02017ef6bf3e2fc13439f5643f4df2ce8eb7a76b1a0697f8e |
| SHA1 hash: | be6c6761a37fe079fd203f5b131c029164de5b69 |
| MD5 hash: | 218117f81f698d56e25733fd02d2e5ce |
| humanhash: | kitten-uniform-table-green |
| File name: | IMPORT-BOOKING DETAILS.xls.bit.zip |
| Download: | download sample |
| Signature | ISRStealer |
| File size: | 589'492 bytes |
| First seen: | 2020-11-16 13:10:52 UTC |
| Last seen: | 2020-11-16 13:13:40 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:Q5xv0KwVbIJfsGa47FWJG7vgXOSkAv7OyDL4y11jUC2M3vnLW7t:YZ/wVIVxa4557o+SkAvDDV1jUz3t |
| TLSH | CCC433CD7C727AE4235DEFCA4C816A2DBD335B773D56B049628C8461CF0A401FDA89A9 |
| Reporter | |
| Tags: | zip |
cocaman
Malicious email (T1566.001)From: "Hussain Khokhar <hussain.al@qasimlogistics.com>" (likely spoofed)
Received: "from qasimlogistics.com (unknown [103.53.41.195]) "
Date: "16 Nov 2020 17:17:42 +0530"
Subject: "FW: CUSTOMER ADVISORY - BOOKING/ IMPORT CONGESTION SURCHARGE FROM 19TH NOVEMBER 2020"
Attachment: "IMPORT-BOOKING DETAILS.xls.bit.zip"
Intelligence
File Origin
# of uploads :
2
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Result
Gathering data
Threat name:
Win32.Spyware.OutBreak
Status:
Suspicious
First seen:
2020-11-16 11:39:20 UTC
File Type:
Binary (Archive)
Extracted files:
48
AV detection:
25 of 29 (86.21%)
Threat level:
2/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.