MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 017f433a49afcc765c5a5e7f39de6251fbe37d9c98f7d86f1abcefb1a9f559bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 017f433a49afcc765c5a5e7f39de6251fbe37d9c98f7d86f1abcefb1a9f559bc
SHA3-384 hash: 8f43a13a0d588f9f6deaf9bb9dab78f5b3fe5df79dd0721dc6ea726d9d189f574276d04216ababe160d5c0f91d13d0f5
SHA1 hash: 37c19b86622d1a9725a87c288af816aadda575a2
MD5 hash: 94c591351a9f0c0e8c61ee32b1e4bed8
humanhash: hawaii-whiskey-carolina-failed
File name:List of our purchase order.exe
Download: download sample
Signature FormBook
File size:1'135'104 bytes
First seen:2020-06-23 05:57:52 UTC
Last seen:2020-06-23 07:54:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8299f715d855d2a6068b551514417b5d (2 x RemcosRAT, 2 x FormBook, 1 x NetWire)
ssdeep 12288:djDbd29xj+02YMHFpC0cjKdOaQKj7sHkp1OcM+u4n+rpRz6gh:dfR29002pHFpC0cjKdjQKsEnOdL4gz
Threatray 5'365 similar samples on MalwareBazaar
TLSH 45357C22F380C837D0631B758C5FD7A86826BE546E28984B3AE93F0D5FB5351353A297
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: aquila.tvas.ro
Sending IP: 195.225.140.6
From: sales@aktio.co.th
Subject: Re: Re: Re: Re: Re: Re: Order
Attachment: List of our purchase order.zip (contains "List of our purchase order.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2020-06-23 00:26:37 UTC
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware evasion trojan
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies Internet Explorer settings
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Adds Run entry to policy start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

3c69cb71711cfa70e1d522f80cf80486

FormBook

Executable exe 017f433a49afcc765c5a5e7f39de6251fbe37d9c98f7d86f1abcefb1a9f559bc

(this sample)

  
Dropped by
MD5 3c69cb71711cfa70e1d522f80cf80486
  
Delivery method
Distributed via e-mail attachment

Comments