MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e694c5c2ca2e7610041c968bab9e8af4d8081ddf0b1c7af9facbcb6e4ee6c4c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e694c5c2ca2e7610041c968bab9e8af4d8081ddf0b1c7af9facbcb6e4ee6c4c6
SHA3-384 hash: 3e8adf5655622e7da456485cbe2e7fca261d81d6ca5bf995ec5fa31b7bde80251393a9de7e862e4b6852defdbe0a933e
SHA1 hash: 1ade6a9b16c62694747cc8c179b73b1f68858615
MD5 hash: cc9d53393e894d812d5274e73e2c03d8
humanhash: winter-foxtrot-massachusetts-emma
File name:REVISED PROFORMA INVOICE.r00
Download: download sample
Signature AgentTesla
File size:886'267 bytes
First seen:2021-03-23 06:26:44 UTC
Last seen:2021-03-23 06:27:37 UTC
File type: r00
MIME type:application/x-rar
ssdeep 24576:1+OacolqZ9YTg5s4mQNNRQ5JGaLfC2tJSf+:1+OacAiYUG4mQPO5J7CKJp
TLSH 411533D25BF73DE94357A81C0A4F66340F161B9075FA27B0C378A6236C479F8253B4AA
Reporter cocaman
Tags:AgentTesla INVOICE r00


Avatar
cocaman
Malicious email (T1566.001)
From: "satender@indiabulls.com" (likely spoofed)
Received: "from indiabulls.com (unknown [185.222.57.157]) "
Date: "22 Mar 2021 17:37:16 -0700"
Subject: "RE: New supply -Proforma"
Attachment: "REVISED PROFORMA INVOICE.r00"

Intelligence


File Origin
# of uploads :
3
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.GenericML
Status:
Malicious
First seen:
2021-03-22 22:07:40 UTC
File Type:
Binary (Archive)
Extracted files:
26
AV detection:
9 of 48 (18.75%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

r00 e694c5c2ca2e7610041c968bab9e8af4d8081ddf0b1c7af9facbcb6e4ee6c4c6

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
AgentTesla

Comments