MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 688d89890b3655d8b2810d5c9d9684b664344e91c9e57c04dfc502e150b5c234. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | 688d89890b3655d8b2810d5c9d9684b664344e91c9e57c04dfc502e150b5c234 |
|---|---|
| SHA3-384 hash: | 5343fae92f6e0ba7fae29496b144d0adab69f377e7ec95e4725668b058e0b47e37148903a41f4a69a8cccac47b1252ea |
| SHA1 hash: | 4f064cc2b9bea7d77dceb4b390727b1ea10ca1e0 |
| MD5 hash: | 858dccc3d7cb1cdbf5e7c0ade8c9bd98 |
| humanhash: | golf-hawaii-tennessee-vegan |
| File name: | Tracking No_pdf.gz |
| Download: | download sample |
| File size: | 539'013 bytes |
| First seen: | 2020-10-07 05:03:08 UTC |
| Last seen: | 2020-10-07 05:04:17 UTC |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 12288:5i74+FW4NmuT/no9FcjCIymvk8DxPljn+bO5yyC:Q7LFSuT/nouCIymM8VlYQTC |
| TLSH | ABB423B0E706C60ACBAB4D79732147FA7850754F916D019EF31C230B2552A8BEADF46E |
| Reporter | |
| Tags: | gz |
abuse_ch
Malspam distributing unidentified malware:HELO: Kravag.de
Sending IP: 45.137.22.75
From: Pia.Baier@Kravag.de
Subject: WG: CIV2020-10 Shipping Documents
Attachment: Tracking No_pdf.gz (contains "Tracking No_pdf.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-07 02:08:24 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
4 of 47 (8.51%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
gz 688d89890b3655d8b2810d5c9d9684b664344e91c9e57c04dfc502e150b5c234
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.