MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3bc65bad2802d4d9e30fc08c245143998f32193521d347c406946cf6edc8b9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b3bc65bad2802d4d9e30fc08c245143998f32193521d347c406946cf6edc8b9a
SHA3-384 hash: 2348233327c8a0e4208c825c4b5670556b55cf8d7659d1ba2e1ad85e108a1819ac7b9bc55dcc149a22dd53ddf864430e
SHA1 hash: 24eda5f0acb23327e9a37ae104afcb893f5820b2
MD5 hash: 139c6698ef6fe0b516141ef2ff2e2a33
humanhash: twelve-virginia-thirteen-alaska
File name:08042021New-PurchaseOrder.zip
Download: download sample
Signature AgentTesla
File size:11'922 bytes
First seen:2021-04-08 08:49:37 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 192:cvGoA8aJLE+nlrRhHk8vEpfa/O9ye/5Q3GxExtxQrN4VM+dBLV9U4JVAZ+:mF2Va5h1DMoN4VM+dS4
TLSH 9232C109CC60CBA0A33DFD2960189DD43740591F90B67D152F98DEA4FCD69817632EC3
Reporter abuse_ch
Tags:Yahoo zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: sonic305-29.consmr.mail.bf2.yahoo.com
Sending IP: 74.6.133.228
From: Emad Salah <chrisdolas@yahoo.com>
Subject: Re: Re: New Purchase Order
Attachment: 08042021New-PurchaseOrder.zip (contains "08042021New-PurchaseOrder.bat")

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.PUA.Wacapew
Status:
Malicious
First seen:
2021-04-08 08:50:06 UTC
AV detection:
9 of 48 (18.75%)
Threat level:
  1/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip b3bc65bad2802d4d9e30fc08c245143998f32193521d347c406946cf6edc8b9a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments