MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 790b13ea527f4aec97d5eeac2fb96fa2e4bca13c0a18ff1456350516d6430d9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 790b13ea527f4aec97d5eeac2fb96fa2e4bca13c0a18ff1456350516d6430d9f
SHA3-384 hash: e91e250acbc5f68f328b31564d905038690a03bd749e0eca667eded57866dd142dfad1cb669f55063472175de6f73977
SHA1 hash: eaaf1ea76f60b9743da71718c3ade2de3ce1030e
MD5 hash: a09e863035ac94604e51d76f3b3c71b2
humanhash: ack-hawaii-eighteen-lemon
File name:INVOICE.zip
Download: download sample
Signature AgentTesla
File size:654'793 bytes
First seen:2021-03-20 10:56:45 UTC
Last seen:2021-03-29 13:00:08 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:HNeS/HfM+d63QAVHhl1PJXRYhLy1IU5qq6SqHIf/zZa+Ou4DTkSbz7I:9//M3VBl1PPYgKhJH6a+QXI
TLSH 8BD4232B14105DCA2B096EFF866CBE8217521325BB7EB9F77DC9D84C44D1488B229CF0
Reporter cocaman
Tags:AgentTesla INVOICE zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Andyln Andrew<rebes01@tejidosrebes.com>" (likely spoofed)
Received: "from postfix-inbound-9.inbound.mailchannels.net (inbound-egress-5.mailchannels.net [199.10.31.237]) "
Date: "20 Mar 2021 11:47:13 -0700"
Subject: "New Invoice we prepare for our bulk orders"
Attachment: "INVOICE.zip"

Intelligence


File Origin
# of uploads :
3
# of downloads :
281
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-20 10:57:05 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 790b13ea527f4aec97d5eeac2fb96fa2e4bca13c0a18ff1456350516d6430d9f

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments