MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 85a34f356f30eb049c28f2fdd1a2a248efc04281b66091a4477fb2df70b6a03c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kutaki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 85a34f356f30eb049c28f2fdd1a2a248efc04281b66091a4477fb2df70b6a03c
SHA3-384 hash: ed6a168f73e006c2f7f03ea83172d5a3089d67b3432c9dea215f5501e1d590dba01cb063d20275b3dbd4766b5376f67a
SHA1 hash: 8f1b22f0fc637c7d65a1d2a4d91a1fee72c183e3
MD5 hash: 34a55febf97a3ac2edd9ef5554b42747
humanhash: vermont-carpet-avocado-avocado
File name:PPS Ford Payment Receipt.zip
Download: download sample
Signature Kutaki
File size:444'807 bytes
First seen:2020-10-07 04:46:51 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:xu/YYaA1JMVFVs4WA9Pm7/kTutI0S0+CkvjZYRY:NA1W3m7/yt0S0+CkvVL
TLSH 5E94230C095D4F49AADF38F88633F4BA060466EF1344A0694ED873FAD217997B99B50F
Reporter abuse_ch
Tags:Kutaki zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mx47.ctrls.in
Sending IP: 182.18.138.45
From: PPS Ford <tlshowroom.vizag@ppsford.com>
Subject: PPS Ford RGTS PAYMENT
Attachment: PPS Ford Payment Receipt.zip (contains "PPS Ford Payment Receipt.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-07 03:23:32 UTC
AV detection:
9 of 48 (18.75%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Kutaki

zip 85a34f356f30eb049c28f2fdd1a2a248efc04281b66091a4477fb2df70b6a03c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments