MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cdd2e1a50f785d5e40d67c7dc9aa663f936494bcdb94c11d3f0164a4f9a5267c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cdd2e1a50f785d5e40d67c7dc9aa663f936494bcdb94c11d3f0164a4f9a5267c
SHA3-384 hash: 0ea1604648fbd55041b49f1c498441a6cef9e6eae834d29e84908419b8e5c4e5bb308affcfa3f41e59813b3fa6652623
SHA1 hash: 33c0effcfd97d354255cb08092e50bcde244715c
MD5 hash: b9bd6b873b71e0f697864558f8785a58
humanhash: dakota-pasta-four-wisconsin
File name:New PO.zip
Download: download sample
File size:877'120 bytes
First seen:2021-03-25 10:15:31 UTC
Last seen:2021-03-25 11:42:56 UTC
File type: zip
MIME type:application/zip
ssdeep 24576:NUk/8fDoCHzsv+HdKdrAHxfuhFDyeoANwS/:SFfDgvydK9IBc8etGS/
TLSH 4E1533687D6A0F5D3FB2636A45CE1B523C81B73A4B2B2E110436E3A529C747DC85BF84
Reporter abuse_ch
Tags:zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: genesis-intex.com
Sending IP: 103.207.39.71
From: genesis<prewan@genesis-intex.com>
Subject: RE: Request for prices and lead time 3/25/2021
Attachment: New PO.zip (contains "New PO.exe")

Intelligence


File Origin
# of uploads :
3
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-25 10:16:12 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

zip cdd2e1a50f785d5e40d67c7dc9aa663f936494bcdb94c11d3f0164a4f9a5267c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments