MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fba1f5e8c043e9b6526a8bdb412724134fc233c2c0afa3baa6b37a9cbd179836. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AgentTesla
Vendor detections: 2
| SHA256 hash: | fba1f5e8c043e9b6526a8bdb412724134fc233c2c0afa3baa6b37a9cbd179836 |
|---|---|
| SHA3-384 hash: | ddc7ee2f40b97b483a71b201fd6c797949ee3317e2cbee9ae15ce4337f0a3f211f2a9ca9de1c88c956a4127b645b48cc |
| SHA1 hash: | 5f672de8c884ff93ede2be7a0247fd1a6e3a10fb |
| MD5 hash: | c6429610c6c0c9c6f9e2be055dfa12ac |
| humanhash: | nine-echo-artist-winter |
| File name: | APC_abc2aaa8_8492081651__PDF____________________________________________________________________6474 |
| Download: | download sample |
| Signature | AgentTesla |
| File size: | 412'637 bytes |
| First seen: | 2020-08-17 14:01:45 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:ZQ9jX/xrk+xOlgmoQZX8+a8IqRO4TmLzqIKX143:6V5rkGA5jXNa8xO4gvAO3 |
| TLSH | 1D9423DB858ED746638338F6746FBDAE60733A03DBAD5C1686CC41B4A4A3431CC9AD94 |
| Reporter | |
| Tags: | AgentTesla DHL |
abuse_ch
Malspam distributing AgentTesla:HELO: www4.almsoft.net
Sending IP: 193.239.194.10
From: DHL BoE & Duty Info <support@dhl.com>
Subject: BOE:AWB 8492081651 – Clearance Documents
Attachment: APC_abc2aaa8_8492081651__PDF____________________________________________________________________6474 (contains "APC_abc2aaa8_8492081651__PDF____________________________________________________________________647464.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
61
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-08-17 14:02:11 UTC
AV detection:
15 of 48 (31.25%)
Threat level:
5/5
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
AgentTesla
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.