MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 922549ce2ae0df536e9305280201c19f65fbed6f5ba93f60d2cdf5724ba2ab56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 5
| SHA256 hash: | 922549ce2ae0df536e9305280201c19f65fbed6f5ba93f60d2cdf5724ba2ab56 |
|---|---|
| SHA3-384 hash: | dfadcb0b2b90c49b8054126848a03b854e0b2d97be4a011a963d34013b06687a4ad632119f58c3e996a06626c62d1e74 |
| SHA1 hash: | fa1b7a9126744ed53ca5c8c59668c539769c236f |
| MD5 hash: | e0c32baa78f263a01a2118401aeba791 |
| humanhash: | lamp-mississippi-pluto-mirror |
| File name: | Order 01042021-V728394-H16.pdf.gz |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 817'436 bytes |
| First seen: | 2021-04-06 05:19:06 UTC |
| Last seen: | 2021-04-06 05:19:59 UTC |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 12288:3u/XJlJJHCGmypDyXTqyDlK84ylRJrNG7KcDmLwJlHjchXuWjrKb9h/XTfhZGihc:3QbDqyxDElKUlRPC/4eWqbf/1ZGk61J |
| TLSH | BD0533DE9E496E7DC256A11B1C51E88245D7A392A03D9A3F270F105AD0B37F8C093E9F |
| Reporter | |
| Tags: | AgentTesla gz |
cocaman
Malicious email (T1566.001)From: "Giada Boschi <g.boschi.soilmec@335.eryfj.ml>" (likely spoofed)
Received: "from hp0.335.eryfj.ml (hp0.335.eryfj.ml [104.236.60.229]) "
Date: "05 Apr 2021 03:00:09 -0700"
Subject: "RE: REQUEST FOR QUOTATION FOR APRIL PRODUCTION"
Attachment: "Order 01042021-V728394-H16.pdf.gz"
Intelligence
File Origin
# of uploads :
3
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-05 09:33:57 UTC
File Type:
Binary (Archive)
Extracted files:
32
AV detection:
7 of 48 (14.58%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.81
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
AgentTesla
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.