MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 837d2b860f27afa125bcb08e049fd49d0d778753e91afa3bc1de63a2d512d250. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 837d2b860f27afa125bcb08e049fd49d0d778753e91afa3bc1de63a2d512d250
SHA3-384 hash: 6abe331e4589c8805f1ab9a6f33c64d54fff8cb826dee16cc2eca2ad83cb5e0d59b5279d264dee98427f634a321d3fdd
SHA1 hash: 0bbef6e5b15d8ef12c67c814346f3423f27fe891
MD5 hash: 7e661554e5ec2d8aaa68d22d75135755
humanhash: lake-lake-nineteen-nine
File name:dhl_doc8532967438.zip
Download: download sample
Signature AgentTesla
File size:802'957 bytes
First seen:2020-12-10 08:48:30 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:B+IAL2TCAo7F63LBkNog80zNPo5HyYcVrJ5lZ8Rcm:wIAS+57F676B8YohDgzlZ8Rcm
TLSH 1F052304FF0643B9C62EE0B97EA19E2E5CE76BEC246B4BC84491C31FF4707991AB5854
Reporter cocaman
Tags:zip


Avatar
cocaman
Malicious email (T1566.001)
From: "DHL COURIER <No_reply@postdhl.com>" (likely spoofed)
Received: "from ad.advancetele.live (ad.advancetele.live [45.95.168.79]) "
Date: "Thu, 10 Dec 2020 08:20:34 +0000"
Subject: "DHL Shipment Notification : 8532967438"
Attachment: "dhl_doc8532967438.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-12-10 08:49:05 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
6 of 48 (12.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 837d2b860f27afa125bcb08e049fd49d0d778753e91afa3bc1de63a2d512d250

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments