MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0b8c66e9190e3e63ca90c062a6ce579f1a1b37845e254d87a78cef5b595e142. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: f0b8c66e9190e3e63ca90c062a6ce579f1a1b37845e254d87a78cef5b595e142
SHA3-384 hash: 1376583fa71f40e7732dbaf88bfaf6936ab966337379b8357ab296c55d97f3efdc8010204ba31283b679774e37ccbad6
SHA1 hash: b077454b42294795bc7f18f3f1c49b0c0a4c3d0a
MD5 hash: a2e1a501168771ccbd8cf7520bf2dae5
humanhash: two-finch-pizza-robert
File name:PO 6400008164.r11
Download: download sample
Signature AgentTesla
File size:337'792 bytes
First seen:2020-10-05 12:03:10 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:a352kJvnvJo79mRrlXIPfoo0vmQxxILdib1STamZimaDomQRHZJZjPtn:ap2k9Joxu9S50Omxw0wTMlDbQHh
TLSH 1B7423D981A1FC7556DDF378DEEB403C03D09E2E9B45CE8826BA34EA1146993773B604
Reporter abuse_ch
Tags:AgentTesla r11


Avatar
abuse_ch
Malspam distributing AgentTesla:

From: COMECO Export <export@comeco.org>
Subject: RFQ (2)Comeco Purchase Order
Attachment: PO 6400008164.r11 (contains "PO 6400008164.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-05 10:00:32 UTC
AV detection:
8 of 47 (17.02%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

rar f0b8c66e9190e3e63ca90c062a6ce579f1a1b37845e254d87a78cef5b595e142

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

Comments