MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a551052780c11490c610f4f0fdb214f7036b3bc5065783252af658bccda9ebba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: a551052780c11490c610f4f0fdb214f7036b3bc5065783252af658bccda9ebba
SHA3-384 hash: 18b68512a347b49672f69bc72ec6cd3443f696dd7c6cffd31165f568279267632ea6777f6875b8d69587afa5a12125c0
SHA1 hash: d34437ad2b952dcc57ab8080eb695b024eb22245
MD5 hash: cd0c127cd2c06b065a81e66070f1f73e
humanhash: beer-low-idaho-august
File name:Purchase Order_ (#PO1283)_ Ref. Q250804-06.zip
Download: download sample
Signature AgentTesla
File size:1'427 bytes
First seen:2025-08-05 08:53:12 UTC
Last seen:2025-08-05 09:00:20 UTC
File type: zip
MIME type:application/zip
ssdeep 24:9UcwNxHW+YcXPLgZHQf7Oj9ObHYr9AWcGA/wqnrv7fSv52ZUwQA/YwGNo4tmDccV:9Aec0ZHQfqcD+JcGNqnrzSv52rQiYw0U
TLSH T15A21E923D30945B8E10916F37D6CF80DF85C911280B73BB3521F1E89496F3E64943671
Magika zip
Reporter cocaman
Tags:zip


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?B?SGlsYWwgS2FyYWthxZ8=?= <mertul@kit-fa.com>" (likely spoofed)
Received: "from vmi2667564.contaboserver.net (vmi2667564.contaboserver.net [62.146.237.234]) "
Date: "4 Aug 2025 04:04:14 -0700"
Subject: "Re: Purchase Order_ (#PO//1283)_ Ref. : Q250804-06"
Attachment: "Purchase Order_ (#PO1283)_ Ref. Q250804-06.zip"

Intelligence


File Origin
# of uploads :
3
# of downloads :
42
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Purchase Order_ (#PO1283)_ Ref. Q250804-06.js
File size:2'311 bytes
SHA256 hash: 29c85fdb8eb5813d953a96b97e086e2eb99a7ee841ac5c8cfedeae99ad236195
MD5 hash: 2942dec06ceae84b6dcbba37a86e2066
MIME type:text/plain
Signature AgentTesla
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
dropper spawn small
Result
Verdict:
Malicious
File Type:
JS File - Malicious
Payload URLs
URL
File name
https://files.catbox.moe/vs22tx.zip','ExpandEnvironmentStrings','CreateObject','SaveToFile','967784jPlpyb','CopyHere','send','item','GET','0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ','360006nJwmyB','Close','10VPvICL','6690496wraQII','Copy','Delete','3417825VVgcdZ','28932165zmJYEP','Name','WScript.Shell','charAt','Write','
JS File
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 evasive masquerade packed
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
Zip Archive
Verdict:
Malicious
Threat:
Trojan-Downloader.JS.SLoad
Threat name:
Script-JS.Downloader.AgentTesla
Status:
Malicious
First seen:
2025-08-04 05:46:25 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
21 of 38 (55.26%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Command and Scripting Interpreter: JavaScript
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip a551052780c11490c610f4f0fdb214f7036b3bc5065783252af658bccda9ebba

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments