MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53de6101356f83463e71f48b4a6307f3a6f901ff87230f21721a2ab83d5ff14c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 53de6101356f83463e71f48b4a6307f3a6f901ff87230f21721a2ab83d5ff14c
SHA3-384 hash: 73ae6d45e1d208f79bb93216e3c567001fe54aeb609bf50d547bf14fa2556d5f870710795e53359b87e206c683ea019a
SHA1 hash: 432eef1c756f6cac2d941eb77a0f25ca29e021bc
MD5 hash: 78dab723639f14b92321df388b5f450e
humanhash: king-victor-comet-charlie
File name:9046- PA118- SUPPLY & INSTALLATION OF EQUIPMENTS OILFIELD EQUIPMENTS & SUPPLY_PA118PROCJT9046 -b.pdf.gz
Download: download sample
Signature AgentTesla
File size:555'630 bytes
First seen:2020-08-31 16:20:01 UTC
Last seen:2020-08-31 19:32:57 UTC
File type: gz
MIME type:application/x-rar
ssdeep 12288:XCCmB2VyI/ZbOf/6ksT334JKCBSKCoPBAmfjhp+h+R0k4B+TMEWdMf:Xiw4I/Z8/s7IrBRam7vHEFdMf
TLSH DBC423853F8A3539E0C9EE20334BC970A9C5572FD5B207D90679AD7232ECB854F38995
Reporter cocaman
Tags:AgentTesla gz


Avatar
cocaman
Malicious email
From: Nicole Ya <sales@zzcontrols.com>
Received: from zzcontrols.com (unknown [45.137.22.76])
Date: 31 Aug 2020 09:55:39 -0700
Subject: 9046- PA118- SUPPLY & INSTALLATION OF EQUIPMENTS / OILFIELD EQUIPMENTS & SUPPLY - REQUEST FOR QUOTATION
Attachment: 9046- PA118- SUPPLY & INSTALLATION OF EQUIPMENTS OILFIELD EQUIPMENTS & SUPPLY_PA118PROCJT9046 -b.pdf.gz

Intelligence


File Origin
# of uploads :
7
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-31 08:18:14 UTC
File Type:
Binary (Archive)
Extracted files:
8
AV detection:
14 of 47 (29.79%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz 53de6101356f83463e71f48b4a6307f3a6f901ff87230f21721a2ab83d5ff14c

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments