MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 840789ee2b81becb824ab8b0b6e234415040472c5a3e4d88f04f3bbf1ae267f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 840789ee2b81becb824ab8b0b6e234415040472c5a3e4d88f04f3bbf1ae267f0
SHA3-384 hash: 3c0761b986932b7bf724246f273cfb1157e9647b282d73e52fe8555ce0be9a3e2d81b2150517558bff310547a1a02fb3
SHA1 hash: 02097064294783c9c5d91f70cf163de617903ae5
MD5 hash: a4102868ceda39893c51ea16efafc7fd
humanhash: eight-triple-ten-glucose
File name:PO-LSE-PR009676-2021.pdf.gz
Download: download sample
Signature AgentTesla
File size:515'409 bytes
First seen:2021-01-18 08:27:01 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 6144:mjaMTy60eLP2pjNs7gVXUGWLAC7VOlbhfF8PCpNcMuwqp9Cl/lU6VjCLXwYedZQw:uhT3P2js7fH7VOp84NcBtp9ge8cwBz9
TLSH 29B423AEE0ED9A435835C3B634287316B84CFE5241D4C72DD49E23754EA2D7B69A033B
Reporter abuse_ch
Tags:gz


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: vps.websitesmalaysia.com
Sending IP: 103.233.1.132
From: Purchasing Officer <angela@labroyshipyard.com>
Reply-To: Purchasing Officer <aorreservations@rockglen.com>
Subject: PO#-LSE-PR009676-2021 FOR PT. LABROY SHIPBUILDING ENGINEERING
Attachment: PO-LSE-PR009676-2021.pdf.gz (contains "PO#-LSE-PR009676-2021.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-18 08:16:01 UTC
AV detection:
12 of 45 (26.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

gz 840789ee2b81becb824ab8b0b6e234415040472c5a3e4d88f04f3bbf1ae267f0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments