MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8a07ebbecc711f77f14fa0a1902ddc74b3da8042500319b603754790b778caca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 8a07ebbecc711f77f14fa0a1902ddc74b3da8042500319b603754790b778caca |
|---|---|
| SHA3-384 hash: | ba2e3e45405b807a50494cfe424de247600b343b2b1923ffaebf8169e84994d8b88ae68ff33626fe06b7e8561d517a3a |
| SHA1 hash: | 001c26072e8137d3137998bf44c34a934e3bf3a8 |
| MD5 hash: | 6b7571a38e23526796ebd9c1bc7fcc1f |
| humanhash: | august-oxygen-grey-jupiter |
| File name: | Quotation Request Form.exe |
| Download: | download sample |
| File size: | 507'392 bytes |
| First seen: | 2020-10-08 12:28:45 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:yAMKRNMjnhoUHA1yLuNXh15UOUegZHnUF2D09S:3RNMT6PpG8gpUFAeS |
| Threatray | 2 similar samples on MalwareBazaar |
| TLSH | CDB4F13563949B56D2BE07F651B1164093F4E612DB03FB0EAEF438EE2E93B904923187 |
| Reporter | |
| Tags: | exe geo KOR |
abuse_ch
Malspam distributing unidentified malware:HELO: mail-smail-vm29.hanmail.net
Sending IP: 203.133.180.213
From: 옥산 <dieset129212@hanmail.net>
Subject: RE: 견적요청드립니다.
Attachment: Quotation Request Form.cab (contains "Quotation Request Form.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Ransomware.TeslaCrypt
Status:
Malicious
First seen:
2020-10-08 11:35:25 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Unpacked files
SH256 hash:
8a07ebbecc711f77f14fa0a1902ddc74b3da8042500319b603754790b778caca
MD5 hash:
6b7571a38e23526796ebd9c1bc7fcc1f
SHA1 hash:
001c26072e8137d3137998bf44c34a934e3bf3a8
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
AgentTesla
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe 8a07ebbecc711f77f14fa0a1902ddc74b3da8042500319b603754790b778caca
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.