MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry

Intelligence 2 File information 5 Yara 3 Comments

SHA256 hash: 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3
SHA3-384 hash: ea6c67d0fd8d78e5d0940330b85337e597329a383dcb6e3bfc32754341c54e4f0b8fc630487cf081aaf1d917f0ab033f
SHA1 hash: 4137b1a66c92dd0db5d1458d0fb8d3a048147663
MD5 hash: e961d77e00c45f04a0d35f0568556432
humanhash: ack-magnesium-early-neptune
File name:Shipment Document BL,INV and Packing list Attached.exe
Download: download sample
Signature FormBook
File size:342'016 bytes
First seen:2020-06-30 01:46:40 UTC
Last seen:2020-06-30 13:36:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:m/tv2x56MLmJ0NomGW7dRFwn9jRJ6IlEtfoDTHYNTxZv0GcNqkCiU:m2dLxGGdRFwn99JzlQgn4NFCS
TLSH F374F168737C6D3FCEBC09F99483624843B585B63842F6D68CC570EA68DBBE91903917
Reporter @jarumlus


Mail intelligence
Trap location Impact
CH Switzerland Low
Global Low
# of uploads 3
# of downloads 33
Origin country US US
CAPE Sandbox Detection:Formbook
CERT.PL MWDB Detection:formbook
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Kryptik
First seen:2020-06-29 19:53:09 UTC
AV detection:26 of 31 (83.87%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   7/10
Malware Family:n/a
Tags:evasion trojan
VirusTotal:Virustotal results 36.99%

Yara Signatures

Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information

The table below shows additional information about this malware sample such as delivery method and external references.



Executable exe 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3

(this sample)

Dropped by
Delivery method
Distributed via e-mail attachment