MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46ff0fba60c52e68cf9940e843577c55b779fd037e60d03a443201d326007797. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 46ff0fba60c52e68cf9940e843577c55b779fd037e60d03a443201d326007797
SHA3-384 hash: e8de5e427bb921126565c08abc8d582cfd8cee68bd0c7597c06dbe3277b917a8293abb3a138d1537a211c9169c3aaf22
SHA1 hash: 6e5ed018839c2406b9f26f257798a42f2bf23782
MD5 hash: 254a90f7526e2a5eca67918109f9a89d
humanhash: violet-seventeen-shade-illinois
File name:Bank Details.zip
Download: download sample
Signature AgentTesla
File size:966'331 bytes
First seen:2020-09-01 04:57:09 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:SbsZf0EJY08e0kpE2+fGJ/7gPIWRIYvCqX33iZrEVzZ:Sb8f0iVf/7gPIqIuCY33uoJZ
TLSH A32533CED4C1EF794AC1CC246BAABE0771DA2C5B31A1FB0770A31C40517D2B626A6D9D
Reporter abuse_ch
Tags:AgentTesla zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: cloud.albtelecom.net
Sending IP: 79.106.102.54
From: Juan Tan <sales03@endela.cn>
Subject: RE: PAYMENT REMINDER
Attachment: Bank Details.zip (contains "Bank Details.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-31 03:33:43 UTC
AV detection:
6 of 48 (12.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 46ff0fba60c52e68cf9940e843577c55b779fd037e60d03a443201d326007797

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments